Sciweavers

1916 search results - page 288 / 384
» Reasoning with class algebra
Sort
View
USENIX
2003
13 years 10 months ago
Operating System Support for Virtual Machines
Abstract: A virtual-machine monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II...
Samuel T. King, George W. Dunlap, Peter M. Chen
GECCO
2008
Springer
156views Optimization» more  GECCO 2008»
13 years 10 months ago
Computing minimum cuts by randomized search heuristics
We study the minimum s-t-cut problem in graphs with costs on the edges in the context of evolutionary algorithms. Minimum cut problems belong to the class of basic network optimiz...
Frank Neumann, Joachim Reichel, Martin Skutella
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 9 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
AUTOMATICA
2007
107views more  AUTOMATICA 2007»
13 years 9 months ago
Adaptive boundary control for unstable parabolic PDEs - Part II: Estimation-based designs
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (...
Andrey Smyshlyaev, Miroslav Krstic
IEICET
2008
113views more  IEICET 2008»
13 years 9 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...