Sciweavers

1479 search results - page 209 / 296
» Management without (Detailed) Models
Sort
View
136
Voted
ESORICS
2003
Springer
15 years 9 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
BMAS
2000
IEEE
15 years 9 months ago
Verilog-AMS: Mixed-Signal Simulation and Cross Domain Connect Modules
Verilog-AMS is one of the major mixed-signal hardware description languages on today’s market. In addition to the extended capabilities to model analog and digital behavior, the...
Peter Frey, Donald O'Riordan
ACMSE
2005
ACM
15 years 6 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
143
Voted
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 5 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
16 years 4 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...