Sciweavers

31 search results - page 5 / 7
» Formalizing work: reallocating redundancy
Sort
View
GROUP
2007
ACM
13 years 7 months ago
From plans to planning: the case of nursing plans
Drawing on a critical perspective stemming from socially informed studies of medicine, we analyze an ongoing effort to establish electronic nursing plans at the university hospita...
Glenn Munkvold, Gunnar Ellingsen, Eric Monteiro
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
13 years 7 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
TCS
2010
13 years 4 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
JCS
2010
80views more  JCS 2010»
13 years 17 days ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
STORAGESS
2005
ACM
13 years 11 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok