Sciweavers

1421 search results - page 40 / 285
» The First and Second Max-SAT Evaluations
Sort
View
EUROSYS
2009
ACM
14 years 4 months ago
First-aid: surviving and preventing memory management bugs during production runs
Memory bugs in C/C++ programs severely affect system availability and security. This paper presents First-Aid, a lightweight runtime system that survives software failures caused ...
Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin
ICDE
1997
IEEE
176views Database» more  ICDE 1997»
14 years 9 months ago
ODB-QOPTIMIZER: A Tool for Semantic Query Optimization in OODB
2. ODB-QOPTIMIZER : the tool ODB-QOPTIMIZERis a ODMG 93 compliant tool for the schema validation and semantic query optimization. The approach is based on two fundamental ingredien...
Sonia Bergamaschi, Domenico Beneventano, Claudio S...
ICIP
2008
IEEE
14 years 2 months ago
Decomposition of branching volume data by tip detection
We present an approach to decomposing branching volume data into sub-branches. First, a metric is proposed for evaluating local convexities in volumetric data, and it is a criteri...
Wei Ma, Bo Xiang, Xiaopeng Zhang, Hongbin Zha
METRICS
2005
IEEE
14 years 1 months ago
Can We Teach Empirical Software Engineering?
We report about an empirical software engineering course for PhD students. We introduce its syllabus and two different pedagogical strategies. The first strategy is based on indiv...
Maria Letizia Jaccheri, Thomas Østerlie
MIDDLEWARE
2004
Springer
14 years 29 days ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...