Sciweavers

5255 search results - page 907 / 1051
» Formal Methods for Privacy
Sort
View
ISSTA
2009
ACM
15 years 10 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
BMEI
2008
IEEE
15 years 10 months ago
Adaptive Gene Expression Programming Algorithm Based on Cloud Model
Standard Gene Expression Programming(GEP) works with fixed rate of mutation and crossover, ignoring the variation of the individual fitness, hence it works in the local optimum st...
Yue Jiang, Chang-jie Tang, Haichun Zheng, Chuan Li...
CEC
2008
IEEE
15 years 10 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...
110
Voted
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 10 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
ICMCS
2008
IEEE
120views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Using Semantic Graphs for Image Search
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...