Sciweavers

5630 search results - page 1018 / 1126
» Computability in Specification
Sort
View
SAC
2008
ACM
15 years 4 months ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...
SAC
2008
ACM
15 years 4 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
198
Voted
SAC
2008
ACM
15 years 4 months ago
Implementing Java modeling language contracts with AspectJ
The Java Modeling Language (JML) is a behavioral interface specification language (BISL) designed for Java. It was developed to improve functional software correctness of Java app...
Henrique Rebêlo, Sérgio Soares, Ricar...
PVLDB
2010
110views more  PVLDB 2010»
15 years 3 months ago
Read-Once Functions and Query Evaluation in Probabilistic Databases
Probabilistic databases hold promise of being a viable means for large-scale uncertainty management, increasingly needed in a number of real world applications domains. However, q...
Prithviraj Sen, Amol Deshpande, Lise Getoor
WIOPT
2010
IEEE
15 years 2 months ago
Flunet: Automated tracking of contacts during flu season
— By analyzing people’s contact patterns over time, it is possible to build efficient delay tolerant networking (DTN) algorithms and derive important data for parameterizing an...
Mohammad S. Hashemian, Kevin G. Stanley, Nathaniel...
« Prev « First page 1018 / 1126 Last » Next »