Sciweavers

2123 search results - page 364 / 425
» Composition of Cyber-Physical Systems
Sort
View
129
Voted
CHI
2010
ACM
15 years 7 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
101
Voted
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 7 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
HICSS
2009
IEEE
168views Biometrics» more  HICSS 2009»
15 years 7 months ago
Enabling Distributed Model Management Using Semantic Web Technologies
In today’s increasingly dynamic and competitive business environment, organizations strive to leverage their information resources to gain and sustain competitive advantage. Deci...
Amit V. Deokar, Omar F. El-Gayar
113
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
105
Voted
TACAS
2009
Springer
131views Algorithms» more  TACAS 2009»
15 years 7 months ago
Verifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing...
Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Ma...