Sciweavers

2061 search results - page 326 / 413
» Authorization for Metacomputing Applications
Sort
View
COMPSAC
2009
IEEE
15 years 7 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
128
Voted
IDEAS
2009
IEEE
111views Database» more  IDEAS 2009»
15 years 7 months ago
Semantics of a runtime adaptable transaction manager
Database Management Systems (DBMSs) that can be tailored to specific requirements offer the potential to improve reliability and maintainability and simultaneously the ability t...
Florian Irmert, Frank Lauterwald, Christoph P. Neu...
97
Voted
MLDM
2009
Springer
15 years 7 months ago
Memory-Based Modeling of Seasonality for Prediction of Climatic Time Series
The paper describes a method for predicting climate time series that consist of significant annual and diurnal seasonal components and a short-term stockastic component. A memory...
Daniel Nikovski, Ganesan Ramachandran
ISSTA
2009
ACM
15 years 7 months ago
Precise pointer reasoning for dynamic test generation
Dynamic test generation consists of executing a program while gathering symbolic constraints on inputs from predicates encountered in branch statements, and of using a constraint ...
Bassem Elkarablieh, Patrice Godefroid, Michael Y. ...
SIGIR
2009
ACM
15 years 7 months ago
Web derived pronunciations for spoken term detection
Indexing and retrieval of speech content in various forms such as broadcast news, customer care data and on-line media has gained a lot of interest for a wide range of application...
Dogan Can, Erica Cooper, Arnab Ghoshal, Martin Jan...