Sciweavers

7961 search results - page 1249 / 1593
» Input-Output Model Programs
Sort
View
131
Voted
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 2 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICSOC
2009
Springer
15 years 2 months ago
Lightweight Composition of Ad-Hoc Enterprise-Class Applications with Context-Aware Enterprise Mashups
The huge demand for ad-hoc and situational enterprise-class applications led to a new kind of Web-based applications, known as enterprise mashups. End users from the business units...
Florian Gilles, Volker Hoyer, Till Janner, Katarin...
IFIP12
2009
15 years 2 months ago
Mining Retail Transaction Data for Targeting Customers with Headroom - A Case Study
We outline a method to model customer behavior from retail transaction data. In particular, we focus on the problem of recommending relevant products to consumers. Addressing this ...
Madhu Shashanka, Michael Giering
ENTCS
2010
88views more  ENTCS 2010»
15 years 2 months ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
« Prev « First page 1249 / 1593 Last » Next »