Sciweavers

4266 search results - page 591 / 854
» The container loading problem
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
SACMAT
2009
ACM
14 years 2 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
ISCA
2007
IEEE
182views Hardware» more  ISCA 2007»
14 years 2 months ago
Configurable isolation: building high availability systems with commodity multi-core processors
High availability is an increasingly important requirement for enterprise systems, often valued more than performance. Systems designed for high availability typically use redunda...
Nidhi Aggarwal, Parthasarathy Ranganathan, Norman ...
WEBI
2007
Springer
14 years 2 months ago
PLF: A Publication List Web Page Finder for Researchers
Finding and keeping track of other researchers’ publication lists is an essential activity for every researcher, because they often contain citations not found elsewhere and may...
Kai-Hsiang Yang, Jen-Ming Chung, Jan-Ming Ho
WEBI
2007
Springer
14 years 2 months ago
Concordance-Based Entity-Oriented Search
— We consider the problem of finding the relevant named entities in response to a search query over a given text corpus. Entity search can readily be used to augment conventiona...
Mikhail Bautin, Steven Skiena