Sciweavers

4762 search results - page 652 / 953
» About the use of protein models
Sort
View
NDSS
2009
IEEE
15 years 8 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
ISPW
2009
IEEE
15 years 8 months ago
Software Product Quality: Ensuring a Common Goal
: Software qualities are in many cases tacit and hard to measure. Thus, there is a potential risk that they get lower priority than deadlines, cost and functionality. This paper pr...
Sebastian Barney, Claes Wohlin
109
Voted
FSTTCS
2009
Springer
15 years 8 months ago
Automata and temporal logic over arbitrary linear time
Linear temporal logic was introduced in order to reason about reactive systems. It is often considered with respect to infinite words, to specify the behaviour of long-running sys...
Julien Cristau
85
Voted
PET
2009
Springer
15 years 8 months ago
APOD: Anonymous Physical Object Delivery
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
Elli Androulaki, Steven M. Bellovin
CRV
2008
IEEE
118views Robotics» more  CRV 2008»
15 years 8 months ago
Generating Semantic Information from 3D Scans of Crime Scenes
Recent advancements in laser and visible light sensor technology allows for the collection of photorealistic 3D scans of large scale spaces. This enables the technology to be used...
Anna Topol, Michael Jenkin, Jarek Gryz, Stephanie ...