نتایج جستجو برای: manages
تعداد نتایج: 5358 فیلتر نتایج به سال:
An SDDS-2000 server currently manages only buckets in its RAM storage [C01]. Several buckets can coexist. When many files are created however, RAM storage space may not be sufficient for all the buckets simultaneously. When an application requests a bucket, but there is not enough room in RAM for it, one can evict some buckets to the disk. We define a number of promising eviction strategies. Ou...
In 1981, Paris and Wilkie [21] indicated it was an open question whether IΣ0 would satisfy the Second Incompleteness Theorem for Herbrand deduction. We will show that IΣ0 will both obey and defy the Herbrandized version of the Second Incompleteness Theorem, depending on which of several equivalent definitions of IΣ0 one examines.
Many large and small decisions we make in our daily lives-which ice cream to choose, what research projects to pursue, which partner to marry-require an exploration of alternatives before committing to and exploiting the benefits of a particular choice. Furthermore, many decisions require re-evaluation, and further exploration of alternatives, in the face of changing needs or circumstances. Tha...
Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes stores and manages reusable components. This paper describes how a reusable component is created, how it reuses the function and checking if optimized code is being used in building programs and applications. Finally ...
We present a software agent prototype that we have developed to support query reenement in distributed metadata applications. This agent manages a user's query to a distributed metadata database, and helps mitigate the cost of retrieving the results of poorly formed queries that would otherwise result in excessively large returns. It does this by producing a summarization report of the query re...
In this paper we argue for a new service-centric model for developing and implementing intrusion detection systems. This new approach is influenced by the convergence of computer networking and telecommunications systems, and ways that the telecoms industry manages issues of fraud. Interoperability of intrusion detection components with the rest of the system, in particular logging and billing ...
The Carnegie Mellon Communicator system helps users create complex travel itineraries through a conversational interface. Itineraries consist of (multi-leg) flights, hotel and car reservations and are built from actual travel information for North America, obtained from the Web. The system manages dialog using a schema-based approach. Schemas correspond to major units of task information (such ...
(continued on page 3) Ran Canetti and Rosario Gennaro are Research Staff Members at the IBM T.J. Watson Research Center. They can be contacted at [email protected] and [email protected], respectively. Amir Herzberg manages the Network Computing and Security Group at the IBM Haifa Research Lab (Tel-Aviv Annex), and Dalit Naor is a Research Staff Member there. They can be reached at ami...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید