Sciweavers

1656 search results - page 224 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
ASE
2008
102views more  ASE 2008»
15 years 3 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
ICMLA
2004
15 years 4 months ago
LASSO: a learning architecture for semantic web ontologies
Expressing web page content in a way that computers can understand is the key to a semantic web. Generating ontological information from the web automatically using machine learni...
Christopher N. Hammack, Stephen D. Scott
176
Voted
EUROCRYPT
2010
Springer
15 years 7 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
INFOCOM
2012
IEEE
13 years 5 months ago
A statistical approach for target counting in sensor-based surveillance systems
—Target counting in sensor-based surveillance systems is an interesting task that potentially could have many important applications in practice. In such a system, each sensor ou...
Dengyuan Wu, Dechang Chen, Kai Xing, Xiuzhen Cheng
IPPS
2010
IEEE
15 years 5 days ago
Clustering JVMs with software transactional memory support
Affordable transparent clustering solutions to scale non-HPC applications on commodity clusters (such as Terracotta) are emerging for Java Virtual Machines (JVMs). Working in this ...
Christos Kotselidis, Mikel Luján, Mohammad ...