Sciweavers

851 search results - page 67 / 171
» History Effects and Verification
Sort
View
SEC
2008
15 years 3 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
SIGSOFT
2010
ACM
14 years 11 months ago
Rethinking the economics of software engineering
Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
Todd W. Schiller, Michael D. Ernst
ANTS
2006
Springer
73views Algorithms» more  ANTS 2006»
15 years 5 months ago
The Elliptic Curve Database for Conductors to 130000
Abstract. Tabulating elliptic curves has been carried out since the earliest days of machine computation in number theory. After some historical remarks, we report on significant r...
John Cremona
DAC
2008
ACM
16 years 2 months ago
Functional test selection based on unsupervised support vector analysis
Extensive software-based simulation continues to be the mainstream methodology for functional verification of designs. To optimize the use of limited simulation resources, coverag...
Onur Guzey, Li-C. Wang, Jeremy R. Levitt, Harry Fo...
RECOMB
2006
Springer
16 years 2 months ago
Domain Architecture in Homolog Identification
Homology identification is the first step for many genomic studies. Current methods, based on sequence comparison, can result in a substantial number of mis-assignments due to the ...
Nan Song, R. D. Sedgewick, Dannie Durand