Sciweavers

1288 search results - page 255 / 258
» On Analysis of Design Component Contracts: A Case Study
Sort
View
CCS
2003
ACM
15 years 2 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
COLT
2001
Springer
15 years 2 months ago
Ultraconservative Online Algorithms for Multiclass Problems
In this paper we study a paradigm to generalize online classification algorithms for binary classification problems to multiclass problems. The particular hypotheses we investig...
Koby Crammer, Yoram Singer
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
VLDB
1999
ACM
142views Database» more  VLDB 1999»
15 years 1 months ago
Active Storage Hierarchy, Database Systems and Applications - Socratic Exegesis
stract This panel addresses a very important area that is often neglected or overlooked by database systems, database applications developers and data warehouse designers, namely s...
Felipe Cariño, William O'Connell, John Burg...
CONEXT
2008
ACM
14 years 11 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...