Sciweavers

761 search results - page 135 / 153
» The art of multiprocessor programming
Sort
View
TDSC
2008
152views more  TDSC 2008»
13 years 7 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
MP
1998
76views more  MP 1998»
13 years 7 months ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
EUROMED
2010
13 years 6 months ago
Same Same But Different - Comparing Rendering Environments for Interactive Digital Objects
Digital cultural heritage in interactive form can take different shapes. It can be either in the form of interactive virtual representations of non-digital objects like buildings o...
Mark Guttenbrunner, J. Wieners, Andreas Rauber, Ma...
ISSAC
2007
Springer
128views Mathematics» more  ISSAC 2007»
14 years 1 months ago
Productivity and performance using partitioned global address space languages
Partitioned Global Address Space (PGAS) languages combine the programming convenience of shared memory with the locality and performance control of message passing. One such langu...
Katherine A. Yelick, Dan Bonachea, Wei-Yu Chen, Ph...
MICRO
2006
IEEE
117views Hardware» more  MICRO 2006»
14 years 1 months ago
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: t...
Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep T...