Xi

Results: 6529



#Item
1Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-09-27 23:32:05
2Telecommunications engineering / Radio resource management / Information and communications technology / Technology / Electrical engineering / Network performance / 5G / Internet of things / Technology forecasting / Throughput / Channel allocation schemes / Computer network

DYNAMIC SPECTRUM MANAGEMENT FOR 5G Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems Siyu Lin, Linghe Kong (corresponding author), Qian Gao, Muhammad Khurram Khan, Zhangdui Zhong, Xi Jin, and Peng

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-12-01 00:35:36
3Wireless networking / Computing / Information and communications technology / Computer networking / Technology / Network protocols / Data transmission / Internet of things / Vehicular ad hoc network / Wireless ad hoc network / Mobile ad hoc network / Network packet

Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:56
4Aircraft instruments / Standards / Covert channel / Steganography / ARINC 653 / ARINC / Verification / Human behavior / Technology / User interface design / Design

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-10-10 04:10:19
5Computer architecture / Computing / Formal methods / Logic in computer science / Kernel / Linux kernel / L4 microkernel family / Mach / Verification / X86-64 / Formal verification / Satisfiability modulo theories

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-08-21 17:45:06
6Computer architecture / System software / Disk file systems / Data management / Inode / File system / Journaling file system / Log-structured File System / Ext3 / Mkfs / Refinement / Ext4

Push-Button Verification of File Systems via Crash Refinement Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, Xi Wang University of Washington Abstract mentation, and consistency invariants indicating whether

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-08-21 17:45:06
7Computing / Scripting languages / Xargs / Semantic parsing / Filter / Sed / GNU parallel / Find / Command-line interface / Redirection / Parsing / Pipeline

NL2Bash: A Corpus and Semantic Parser for Natural Language Interface to the Linux Operating System Xi Victoria Lin*, Chenglong Wang, Luke Zettlemoyer, Michael D. Ernst Salesforce Research, University of Washington, Unive

Add to Reading List

Source URL: victorialin.net

Language: English - Date: 2018-10-26 01:53:41
8Information technology management / Network management / Computing / Information and communications technology / System administration / PRTG Network Monitor / Network monitoring / Closed-circuit television / Dashboard

CASE STUDY PRTG Network Monitor helps PET-Xi keep a close eye on its network PET-Xi is one of the largest and most well-renowned education training

Add to Reading List

Source URL: hlassets.paessler.com

Language: English - Date: 2018-02-16 04:42:51
9Binary trees / Computing / Computer programming / B-tree / Learning / Data types / Trie / B+ tree / Btrfs / R-tree / T-tree / Tree

A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees by Bruno Castro-Karney Supervised by Xi Wang

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-08-21 17:45:06
10Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
UPDATE