Sciweavers

14078 search results - page 2616 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
95
Voted
WCRE
2007
IEEE
15 years 10 months ago
Clone Detection via Structural Abstraction
tection via Structural Abstraction William S. Evans Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z4, CANADA Christopher W. Fraser Microsoft Re...
William S. Evans, Christopher W. Fraser, Fei Ma
144
Voted
CCS
2007
ACM
15 years 9 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
CSCLP
2007
Springer
15 years 9 months ago
Combining Two Structured Domains for Modeling Various Graph Matching Problems
Abstract. Graph pattern matching is a central application in many fields. In various areas, the structure of the pattern can only be approximated and exact matching is then too ac...
Yves Deville, Grégoire Dooms, Stépha...
DNA
2007
Springer
159views Bioinformatics» more  DNA 2007»
15 years 9 months ago
Activatable Tiles: Compact, Robust Programmable Assembly and Other Applications
While algorithmic DNA self-assembly is, in theory, capable of forming complex patterns, its experimental demonstration has been limited by significant assembly errors. In this pa...
Urmi Majumder, Thomas H. LaBean, John H. Reif
EUROPAR
2007
Springer
15 years 9 months ago
Surrendering Autonomy: Can Cooperative Mobility Help?
In this paper, we develop a Cooperative Mobility Model that captures new salient features of collaborative and mission-oriented MANETs. In particular, the cost-benefit framework o...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
« Prev « First page 2616 / 2816 Last » Next »