Sciweavers

550 search results - page 88 / 110
» A lightweight approach to state based security testing
Sort
View
CCS
2007
ACM
15 years 1 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
CDC
2008
IEEE
174views Control Systems» more  CDC 2008»
15 years 4 months ago
Consensus under communication delays
— This paper deals with the consensus problem under communication network inducing delays. It is well-known that introducing a delay leads in general to a reduction of the perfor...
Alexandre Seuret, Dimos V. Dimarogonas, Karl Henri...
LION
2009
Springer
115views Optimization» more  LION 2009»
15 years 4 months ago
Flexible Stochastic Local Search for Haplotype Inference
Abstract. Haplotype Inference is a challenging problem in bioinformatics that consists in inferring the basic genetic constitution of diploid organisms on the basis of their genoty...
Luca Di Gaspero, Andrea Roli
JMM2
2007
106views more  JMM2 2007»
14 years 9 months ago
Lexical Structure for Dialogue Act Recognition
— This paper deals with automatic dialogue acts (DAs) recognition in Czech. Dialogue acts are sentence-level labels that represent different states of a dialogue, such as questio...
Pavel Král, Christophe Cerisara, Jana Kleck...
SACMAT
2010
ACM
15 years 1 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...