Sciweavers

490 search results - page 19 / 98
» Operations on Records
Sort
View
USENIX
2008
13 years 10 months ago
Using Causality to Diagnose Configuration Bugs
We present a novel method for diagnosing configuration management errors. Our proposed approach deduces the state of a buggy computer by running predicates that test system correc...
Mona Attariyan, Jason Flinn
FAST
2009
13 years 5 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong
CHI
2008
ACM
14 years 8 months ago
Performing thrill: designing telemetry systems and spectator interfaces for amusement rides
Fairground: Thrill Laboratory was a series of live events that augmented the experience of amusement rides. A wearable telemetry system captured video, audio, heart-rate and accel...
Brendan Walker, Holger Schnädelbach, Michael ...
TLCA
2007
Springer
14 years 1 months ago
A Substructural Type System for Delimited Continuations
We propose type systems that abstractly interpret small-step rather than big-step operational semantics. We treat an expression or evaluation context as a structure in a linear log...
Oleg Kiselyov, Chung-chieh Shan
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
14 years 1 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...