Sciweavers

27 search results - page 5 / 6
» Techniques for Validation and Controlled Execution of Proces...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
SIGMOD
2007
ACM
170views Database» more  SIGMOD 2007»
14 years 7 months ago
Cardinality estimation using sample views with quality assurance
Accurate cardinality estimation is critically important to high-quality query optimization. It is well known that conventional cardinality estimation based on histograms or simila...
Per-Åke Larson, Wolfgang Lehner, Jingren Zho...
WSC
2004
13 years 8 months ago
Building Credible Input Models
Most discrete-event simulation models have stochastic elements that mimic the probabilistic nature of the system under consideration. A close match between the input model and the...
Lawrence Leemis
WSC
1998
13 years 8 months ago
Input Modeling
Most discrete-event simulation models have stochastic elements that mimic the probabilistic nature of the system under consideration. A close match between the input model and the...
Lawrence Leemis
TES
2001
Springer
13 years 11 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...