Browse by Subject "computer science"

  • Neelakantam, Naveen; Zilles, Craig (2007-01)
    In this paper, we advocate for a general-purpose, fine-grain memory protection mechanism for use by applications and software development tools. The hardware component of this mechanism consists of two bits (fault-on-read ...

    application/pdf

    application/pdfPDF (318Kb)
  • Iqbal, Shamsi T.; Bailey, Brian P. (2006-10)
    The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we examine the feasibility of building models ...

    application/pdf

    application/pdfPDF (252Kb)
  • Liang, Yingyi; Campbell, Roy H. (2008-05)
    The recent international standard IEC 61850 proposes a unified solution of the communication aspect of substation automation. However, the standard itself is not easily understood by users other than domain experts. We ...

    application/pdf

    application/pdfPDF (130Kb)
  • Li, Man-Lap; Ramachandran, Pradeep; Adve, Sarita V.; Adve, Vikram S.; Zhou, YuanYuan (2007-02)
    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive ...

    application/pdf

    application/pdfPDF (271Kb)
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1Mb)
  • Lakkaraju, Kiran; Gasser, Les (2006-12)
    Multi-Agent Agreement problems (MAP) - the ability of a population of agents to search out and converge on a common state - are central issues in many multi-agent settings, from distributed sensor networks, to meeting ...

    application/pdf

    application/pdfPDF (341Kb)
  • Kapadia, Apu C.; Naldurg, Prasad G.; Campbell, Roy H. (2005-08)
    We propose a policy-based framework using RBAC (Role Based Access Control) to address the unlinkability problem in the context of correlating audit records generated from access to distributed services. We explore this ...

    application/pdf

    application/pdfPDF (259Kb)
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2005-09)
    Previous work has demonstrated that the image variations of many objects (human faces in particular) under variable lighting can be effectively modelled by low dimensional linear spaces. The typical methods for learning a ...

    application/pdf

    application/pdfPDF (494Kb)
  • Escobar, Santiago; Meseguer, Jose; Sasse, Ralf (2007-10)
    Narrowing is a well-known complete procedure for equational E-unification when E can be decomposed as a union E = \Delta \uplus B with B a set of axioms for which a finitary unification algorithm exists, and \Delta a set ...

    application/pdf

    application/pdfPDF (309Kb)
  • Escobar, Santiago; Meseguer, Jose; Sasse, Ralf (2009-03)
    For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

    application/pdf

    application/pdfPDF (312Kb)
  • Fang, Hui (2006-05)
    Both the measurement and simulation of unsteady flow yield huge datasets of time-varying volumetric vector fields. Flow dynamics researchers face the very difficult task of finding, extracting and analyzing important flow ...

    application/pdf

    application/pdfPDF (31Mb)
  • Lee, Adam J.; Winslett, Marianne (2006-02)
    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, ...

    application/pdf

    application/pdfPDF (348Kb)
  • Bergstrom, Tony; Karahalios, Karrie (2008-12)
    In face-to-face group situations, social pressure and organizational hierarchy relegate the less outspoken into silence, often resulting in fewer voices, fewer ideas, and group-think. However, in mediated interaction, such ...

    application/pdf

    application/pdfPDF (3Mb)
  • Boronat, Artur; Knapp, Alexander; Meseguer, Jose; Wirsing, Martin (2008-10)
    In large software projects often multiple modeling languages are used in order to cover the different domains and views of the application and the language skills of the developers appropriately. Such "multi-modeling" ...

    application/pdf

    application/pdfPDF (704Kb)
  • Bazeghi, Cyrus; Mesa-Martinez, Fracisco J.; Greskamp, Brian; Torrellas, Josep; Renau, Jose (2004-08)
    Microprocessor design complexity is growing rapidly. As a result, current development costs for top of the line processors are staggering, and are doubling every 4 years. As we design ever larger and more complex processors, ...

    application/pdf

    application/pdfPDF (263Kb)