Filters








412,385 Hits in 6.7 sec

Page 119 of Education Vol. 37, Issue 2 [page]

1916 Education  
This is an interesting phase of the question, for the word “sav- ing” does not imply that what is saved is not consumed.  ...  Gotwals, formerly Superintendent of Norristown, Pennsylvania, Public Schools, says, “money that might have been foolishly spent has been used for family support in times of need.”  ... 

Developing an approach for analyzing and verifying system communication

William C. Stratton, Deane E. Sibol, Mikael Lindvall, Chris Ackermann, Sally Godfrey
2009 2009 IEEE Aerospace conference  
DynSAVE X X Planned CFDP Sequence Rules: 1.Check that received FD are not NAKed * 2.Check for duplicate FDs * 3.Check that we have all FDs upon FIN * 4.Check that identical NAKs are not sent  ...  ) tool and process for static analysis of source code -Enhance for dynamic analysis of run-time communication behavior => Dynamic SAVE (DynSAVE) SAVE Tool and Process • SAVE supports static analysis  ... 
doi:10.1109/aero.2009.4839620 fatcat:acr7hjpjdbbsvnh6zzb6xkqesy

Domain-Heuristics for Arc-Consistency Algorithms [chapter]

Marc R. C. van Dongen
2003 Lecture Notes in Computer Science  
They use support-checks (also known as consistency-checks) to find out about the properties of CSPs.  ...  The second algorithm, called D, uses a heuristic based on the notion of a double-support check.  ...  Apparently, L is not able to determine its support in fewer than three support-checks-not even if a matrix does not contain any zero at all.  ... 
doi:10.1007/3-540-36607-5_5 fatcat:ubyfzi6xyndn7haryiwwcxlyue

Instrumentation in software dynamic translators for self-managed systems

Naveen Kumar, Jonathan Misurda, Bruce R. Childers, Mary Lou Soffa
2004 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems - WOSS '04  
Our interface supports multiple levels of granularity from source level constructs to the instruction and machine level.  ...  SDT has been used to build many useful applications, including software security checkers that check for code vulnerabilities, dynamic code optimizers, and program introspection tools.  ...  Acknowledgements This work was supported in part by National Science Foundation grants ACI-0305198 and ACI-0203945 and an IBM Eclipse Innovation Grant. References  ... 
doi:10.1145/1075405.1075423 dblp:conf/woss/KumarMCS04 fatcat:wjltgcuyczer5ffhf2s73tquki

Deterministic Replay of System's Execution with Multi-target QEMU Simulator for Dynamic Analysis and Reverse Debugging

Pavel Dovgalyuk
2012 2012 16th European Conference on Software Maintenance and Reengineering  
ExecRecorder is based on slow Bochs simulator and does not support saving replay log for using it later.  ...  But they support deterministic replay only for 32-bit x86 systems. VMWare also does not provide any mechanisms for implementing dynamic analysis tools on its base.  ... 
doi:10.1109/csmr.2012.74 dblp:conf/csmr/Dovgalyuk12 fatcat:ycemr3gaxvcvpa5ywcpd4qxyde

Reducing Checks and Revisions in Coarse-grained MAC Algorithms

Deepak Mehta, Marc R. C. van Dongen
2005 International Joint Conference on Artificial Intelligence  
First we introduce the notion of a Support Condition (SC) which guarantees that a value has some support. SCs reduce support checks while maintaining arc consistency during search.  ...  Indeed, most revisions are ineffective, i.e. they cannot delete any value and consume a lot of checks and time. We propose two solutions to overcome these problems.  ...  When support checks are not too expensive then ASCs can be an overhead and reducing the checks alone does not always help in reducing the solution time.  ... 
dblp:conf/ijcai/MehtaD05 fatcat:st4ie2jutjczjhql2yybihbp3a

Page 57 of Interpretation Vol. 9, Issue 1 [page]

1955 Interpretation  
But if we examine the letter we will see that Paul does not use the words “save” or “salvation” very many times.’  ...  People need to be saved. God has a way of salvation. The Jews are not being saved. Christians should live like saved people.  ... 

Executing code in the past

Frédéric Pluquet, Stefan Langerman, Roel Wuyts
2009 Proceeding of the 24th ACM SIGPLAN conference on Object oriented programming systems languages and applications - OOPSLA 09  
It needs only three primitives, and existing code does not need to be modified to be versioned. It provides fine-grained control over what parts of objects are versioned and when.  ...  Code can be executed in the past of the system and will see the complete system at that point in time.  ...  Secondly, the system does not lose time and space to save modifications of objects that will never be used.  ... 
doi:10.1145/1640089.1640118 dblp:conf/oopsla/PluquetLW09 fatcat:dn3o7bi75bfhpeso3d743pwaau

Static Architecture-Conformance Checking: An Illustrative Overview

Leonardo Passos, Ricardo Terra, Marco Tulio Valente, Renato Diniz, Nabor das Chagas Mendonca
2010 IEEE Software  
To highlight the similarities and differences between the three techniques, we describe how some of their available supporting tools can be applied to specify and check architectural constraints for a  ...  Acknowledgement: This research was supported by grants from FAPEMIG, CAPES, and CNPq.  ...  However, SAVE does not support the definition of regular expressions over subtype relations.  ... 
doi:10.1109/ms.2009.117 fatcat:xemrevlgkzfopoainlhwjbcaae

Automated Security Debugging Using Program Structural Constraints

Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang
2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)  
Though there exist debugging tools that facilitate the vulnerability analysis and debugging process, human developers still need to manually trace the program execution most of the times.  ...  previous approaches, CBones can automatically identify exploit points of unknown security bugs without requiring a training phase, source code access (analysis or instrumentation), or additional hardware supports  ...  Thus, it does not need to access the source code (in comparison with DAIKON [12] ), nor does it need additional hardware support (in comparison with Acc-Mon [11] ). • No false alarms.  ... 
doi:10.1109/acsac.2007.19 dblp:conf/acsac/KilSNZ07 fatcat:c27mg6riy5e3dkuax6cyls57si

Automated Security Debugging Using Program Structural Constraints

Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang
2007 Proceedings of the Computer Security Applications Conference  
Though there exist debugging tools that facilitate the vulnerability analysis and debugging process, human developers still need to manually trace the program execution most of the times.  ...  previous approaches, CBones can automatically identify exploit points of unknown security bugs without requiring a training phase, source code access (analysis or instrumentation), or additional hardware supports  ...  Thus, it does not need to access the source code (in comparison with DAIKON [12] ), nor does it need additional hardware support (in comparison with Acc-Mon [11] ). • No false alarms.  ... 
doi:10.1109/acsac.2007.4413011 fatcat:ilzp4ax7tnh4vj43hr4ug3hnkq

Multi-grain version control in the Historian system [chapter]

Makram Abu-Shakra, Gene L. Fisher
1998 Lecture Notes in Computer Science  
This paper describes Historian, a version control system that supports comprehensive versioning and features to aid history navigation.  ...  Comprehensive versioning is supported through frequent and automated creation of versions which typically results in a large number of versions.  ...  For example, the frequency of version creation can range from saving at each individual edit operation, at the document save operation, or at each document check-in operation.  ... 
doi:10.1007/bfb0053877 fatcat:pjqmih4jjbhpxdxkg6mhp64c4q

The Impact of Saving in Personal Finance

Sanie Doda, Shkelqim Fortuzi
2015 European Journal of Economics and Business Studies  
Money is a tool, the means by which we support our unique values and priorities. Therefore it is important to create a financial plan, savings strategies.  ...  This does not necessarily mean having a luxurious life, but to adopt effective measures of achieving a certain comfort efficient management of money for each individual brings a qualitative growth.  ...  "Best time to purchase is when you are alone, unhurried and well feed, "Stress and rush does not allow purchase the right stuff " ( What do we mean by debt?  ... 
doi:10.26417/ejes.v2i1.p108-112 fatcat:smapcazppfdphi3gogogatcgdu

UPM: User-Centered Privacy Model in Pervasive Computing Systems

Ali Dehghantanha, Ramlan Mahmod
2009 2009 International Conference on Future Computer and Communication  
In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, identity, location, and time privacy with low unobtrusiveness.  ...  When a user decides to finish off using services or saving content, in the first step the system checks the time privacy policy of the information that the user wants to save.  ...  By default a portal has access just to user location information but it does not have any access to user identity, content, and time information.  ... 
doi:10.1109/icfcc.2009.50 fatcat:aghg6vsrtnbrvn6bj4pq7osrsi

Improving the Efficiency of Steam Turbine Rotor Manufacturing

Sharanakumar, Dr. Chethan Kumar C S, S. Appaiah
2015 International Journal of Engineering Research and  
The estimated savings because of the cycle time reduction is found to be Rs. 1, 17,400/-.  ...  The customer was not satisfied with this and demanded that the rotor be supplied in time.  ...  The phrase "single minute" does not mean that all changeovers and startups should take only one minute, but that they should take less than 10 minutes (in other words, "single-digit minute") [2] .  ... 
doi:10.17577/ijertv4is041417 fatcat:zpfdmrnsybbbxbaamsnyi3syvy
« Previous Showing results 1 — 15 out of 412,385 results