Sciweavers

1828 search results - page 195 / 366
» From Features to Semantics: Some Preliminary Results
Sort
View
SDMW
2004
Springer
15 years 7 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
104
Voted
INDOCRYPT
2003
Springer
15 years 7 months ago
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria
We develop an improved cost function to be used in simulated annealing followed by hill-climbing to find Boolean functions satisfying multiple desirable criteria such as high nonli...
Selçuk Kavut, Melek D. Yücel
LCPC
2001
Springer
15 years 6 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...
IPPS
1999
IEEE
15 years 6 months ago
Implementing a Non-Strict Functional Programming Language on a Threaded Architecture
Abstract. The combination of a language with ne-grain implicit parallelism and a data ow evaluation scheme is suitable for high-level programming on massively parallel architectur...
Shigeru Kusakabe, Kentaro Inenaga, Makoto Amamiya,...
ACMACE
2007
ACM
15 years 5 months ago
Serious video game effectiveness
Given the interactive media characteristics and intrinsically motivating appeal, computer games are often praised for their potential and value in education. However, comprehensiv...
Wee Ling Wong, Cuihua Shen, Luciano Nocera, Eduard...