Sciweavers

1604 search results - page 222 / 321
» Development Separation in Lambda-Calculus
Sort
View
106
Voted
CIT
2007
Springer
15 years 4 months ago
An Aspect Enhanced Method of NFR Modeling in Software Architecture
Existence of crosscutting concerns in software requirements often intensifies complexity of software development. Modeling and analysis of these concerns at software architecture ...
Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, H...
COLT
2007
Springer
15 years 4 months ago
An Efficient Re-scaled Perceptron Algorithm for Conic Systems
Abstract. The classical perceptron algorithm is an elementary algorithm for solving a homogeneous linear inequality system Ax > 0, with many important applications in learning t...
Alexandre Belloni, Robert M. Freund, Santosh Vempa...
85
Voted
ASMTA
2009
Springer
92views Mathematics» more  ASMTA 2009»
15 years 4 months ago
Comparison of Multi-service Routing Strategies for IP Core Networks
Abstract. Service differentiation in IP core networks may be supported by dedicated path selection rules. This paper investigates the degree of service distinction achievable when ...
Ulf Jensen, Armin Heindl
81
Voted
ICDCS
2010
IEEE
15 years 4 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter
103
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 4 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly