Sciweavers

5269 search results - page 915 / 1054
» Operating system resource management
Sort
View
ERLANG
2003
ACM
14 years 2 months ago
A study of Erlang ETS table implementations and performance
The viability of implementing an in-memory database, Erlang ETS, using a relatively-new data structure, called a Judy array, was studied by comparing the performance of ETS tables...
Scott Lystig Fritchie
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
14 years 3 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor
CCS
2004
ACM
14 years 2 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
ANLP
1997
190views more  ANLP 1997»
13 years 10 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi