Sciweavers

1744 search results - page 310 / 349
» The Steganographic File System
Sort
View
245
Voted
ICFP
2009
ACM
16 years 4 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
132
Voted
RAID
1999
Springer
15 years 8 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
144
Voted
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 5 months ago
Fragmentation in Large Object Repositories
Fragmentation leads to unpredictable and degraded application performance. While these problems have been studied in detail for desktop filesystem workloads, this study examines n...
Russell Sears, Catharine van Ingen
149
Voted
QNS
1996
15 years 5 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
169
Voted
BMCBI
2004
124views more  BMCBI 2004»
15 years 3 months ago
The Molecular Pages of the mesotelencephalic dopamine consortium (DopaNet)
Background: DopaNet http://www.dopanet.org is a Systems Biology initiative that aims to investigate precisely and quantitatively all the aspects of neurotransmission in a specific...
Nicolas Le Novère, Marco Donizelli