Sciweavers

873 search results - page 173 / 175
» Effective Use of Organisational Abstractions for Confidence ...
Sort
View
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ICSE
2000
IEEE-ACM
15 years 1 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
ISPASS
2010
IEEE
14 years 11 months ago
Understanding transactional memory performance
Abstract—Transactional memory promises to generalize transactional programming to mainstream languages and data structures. The purported benefit of transactions is that they ar...
Donald E. Porter, Emmett Witchel
EJC
2007
14 years 11 months ago
On the Construction of Ontologies based on Natural Language Semantic
instrumental roles in titles of medical abstracts: a combined conceptual and modelling UML approach Topic – This paper provides a detailed description of the instrumental role in...
Terje Aaberge
DATAMINE
2000
118views more  DATAMINE 2000»
14 years 9 months ago
Spatial Data Mining: Database Primitives, Algorithms and Efficient DBMS Support
Abstract: Spatial data mining algorithms heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a singl...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...