Sciweavers

2797 search results - page 266 / 560
» Code query by example
Sort
View
TKDE
2008
122views more  TKDE 2008»
15 years 3 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
BMCBI
2004
126views more  BMCBI 2004»
15 years 3 months ago
Visualization and analysis of microarray and gene ontology data with treemaps
Background: The increasing complexity of genomic data presents several challenges for biologists. Limited computer monitor views of data complexity and the dynamic nature of data ...
Eric H. Baehrecke, Niem Dang, Ketan Babaria, Ben S...
263
Voted
POPL
2009
ACM
16 years 4 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
119
Voted
ICCD
2001
IEEE
98views Hardware» more  ICCD 2001»
16 years 26 days ago
In-Line Interrupt Handling for Software-Managed TLBs
The general-purpose precise interrupt mechanism, which has long been used to handle exceptional conditions that occur infrequently, is now being used increasingly often to handle ...
Aamer Jaleel, Bruce L. Jacob
ECOOP
2005
Springer
15 years 9 months ago
The Role of Design Information in Software Evolution
Software modeling has received a lot a of attention in the last decade and now is an important support for the design process. Actually, the design process is very important to the...
Walter Cazzola, Sonia Pini, Massimo Ancona