Sciweavers

12193 search results - page 57 / 2439
» It's not all about
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 9 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
SIAMMAX
2010
88views more  SIAMMAX 2010»
14 years 6 months ago
Schur Decompositions of a Matrix and the Boundary of Its Pseudospectrum
Abstract. We discuss the notion of irreducible block Schur decomposition of a complex square matrix and show how such a decomposition provides information about singularities in th...
Lyonell Boulton, Peter Lancaster
PGLDB
2003
123views Database» more  PGLDB 2003»
15 years 1 months ago
The Practice of Instructional Design: The Process and Its Application
There is nowadays a lot of interest in the field of Instructional Design. The focus is still on theories and methodology of Instructional System Design (ISD), which are the fundam...
Ana Lúcia Rossi Mendonça
CORR
2010
Springer
140views Education» more  CORR 2010»
14 years 12 months ago
Classical BI: Its Semantics and Proof Theory
We present Classical BI (CBI), a new addition to the family of bunched logics which originates in O'Hearn and Pym's logic of bunched implications BI. CBI differs from exi...
James Brotherston, Cristiano Calcagno
ISCI
2007
130views more  ISCI 2007»
14 years 11 months ago
Computing with words and its relationships with fuzzistics
ct 9 Words mean different things to different people, and so are uncertain. We, therefore, need a fuzzy set model for a word 10 that has the potential to capture their uncertaint...
Jerry M. Mendel