Sciweavers

8080 search results - page 1577 / 1616
» From Computer Networks to Agent Networks
Sort
View
POPL
2007
ACM
15 years 10 months ago
Program verification as probabilistic inference
In this paper, we propose a new algorithm for proving the validity or invalidity of a pre/postcondition pair for a program. The algorithm is motivated by the success of the algori...
Sumit Gulwani, Nebojsa Jojic
POPL
2005
ACM
15 years 10 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
SIGMOD
2008
ACM
190views Database» more  SIGMOD 2008»
15 years 10 months ago
OLTP through the looking glass, and what we found there
Online Transaction Processing (OLTP) databases include a suite of features -- disk-resident B-trees and heap files, locking-based concurrency control, support for multi-threading ...
Stavros Harizopoulos, Daniel J. Abadi, Samuel Madd...
OZCHI
2009
ACM
15 years 4 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
SAC
2009
ACM
15 years 4 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
« Prev « First page 1577 / 1616 Last » Next »