Sciweavers

1221 search results - page 50 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
132
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 10 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 9 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
137
Voted
BMCBI
2010
156views more  BMCBI 2010»
15 years 3 months ago
Global screening of potential Candida albicans biofilm-related transcription factors via network comparison
Background: Candida albicans is a commonly encountered fungal pathogen in humans. The formation of biofilm is a major virulence factor in C. albicans pathogenesis and is related t...
Yu-Chao Wang, Chung-Yu Lan, Wen-Ping Hsieh, Luis A...
SIGCOMM
2003
ACM
15 years 8 months ago
A comparison of hard-state and soft-state signaling protocols
One of the key infrastructure components in all telecommunication networks, ranging from the telephone network, to VC-oriented data networks, to the Internet, is its signaling sys...
Ping Ji, Zihui Ge, James F. Kurose, Donald F. Tows...
BIRTHDAY
2010
Springer
15 years 4 months ago
Halting and Equivalence of Program Schemes in Models of Arbitrary Theories
In this note we consider the following decision problems. Let be a fixed first-order signature. (i) Given a first-order theory or ground theory T over of Turing degree , a program...
Dexter Kozen