Sciweavers

7379 search results - page 1090 / 1476
» How Many Clusters
Sort
View
CSFW
1999
IEEE
15 years 9 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
142
Voted
CSFW
1999
IEEE
15 years 9 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
135
Voted
GROUP
1999
ACM
15 years 9 months ago
Getting some perspective: using process descriptions to index document history
Process descriptions are used in workflow and related systems to describe the flow of work and organisational responsibility in business processes, and to aid in coordination. How...
Paul Dourish, Richard Bentley, Rachel Jones, Allan...
ICFP
1999
ACM
15 years 9 months ago
Type Dispatch for Named Hierarchical Types
Type dispatch constructs are an important feature of many programming languages. Scheme has predicates for testing the runtime type of a value. Java has a class cast expression an...
Neal Glew
DATE
1999
IEEE
194views Hardware» more  DATE 1999»
15 years 9 months ago
Algorithms for Solving Boolean Satisfiability in Combinational Circuits
Boolean Satisfiability is a ubiquitous modeling tool in Electronic Design Automation, It finds application in test pattern generation, delay-fault testing, combinational equivalen...
Luís Guerra e Silva, Luis Miguel Silveira, ...
« Prev « First page 1090 / 1476 Last » Next »