Sciweavers

3133 search results - page 460 / 627
» Difference systems of sets and cyclotomy
Sort
View
103
Voted
ACSAC
2006
IEEE
15 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
83
Voted
ATVA
2006
Springer
112views Hardware» more  ATVA 2006»
15 years 1 months ago
Synthesis for Probabilistic Environments
In synthesis we construct finite state systems from temporal specifications. While this problem is well understood in the classical setting of non-probabilistic synthesis, this pap...
Sven Schewe
ECUMN
2004
Springer
15 years 1 months ago
UMTS-WLAN Service Integration at Core Network Level
The integration of wireless LANs (WLANs) and 3G systems performed at core network level requires very little modifications to the current 3GPP architecture and provides a large set...
Paulo Pinto, Luis Bernardo, Pedro Sobral
CIARP
2003
Springer
15 years 1 months ago
Uniclass and Multiclass Connectionist Classification of Dialogue Acts
Classification problems are traditionally focused on uniclass samples, that is, each sample of the training and test sets has one unique label, which is the target of the classific...
María José Castro Bleda, David Vilar...
WSC
2007
15 years 14 days ago
Generic simulation of automotive assembly for interoperability testing
Computer simulation is effective in improving the efficiency of manufacturing system design, operation, and maintenance. Most simulation models are usually tailored to address a n...
Deogratias Kibira, Charles R. McLean