Sciweavers

3047 search results - page 497 / 610
» On the Meaning of Logical Completeness
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
14 years 9 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
JIIS
2000
120views more  JIIS 2000»
14 years 9 months ago
Machine Learning for Intelligent Processing of Printed Documents
Abstract. A paper document processing system is an information system component which transforms information on printed or handwritten documents into a computer-revisable form. In ...
Floriana Esposito, Donato Malerba, Francesca A. Li...
CN
1998
59views more  CN 1998»
14 years 9 months ago
Daisy: A Scalable All-Optical Packet Network with Multifiber Ring Topology
This paper presents Daisy, a scalable all-optical packet network where each node is equipped with one wavelength-tunable transmitter and one fixed-wavelength receiver. Network sca...
Marco Ajmone Marsan, Andrea Fumagalli, Emilio Leon...
LRE
2002
84views more  LRE 2002»
14 years 9 months ago
Text-image Coupling for Editing Literary Sources
Users need more sophisticated tools to handle the growing number of image-based documents available in databases. In this paper, we present a system devoted to the editing and bro...
Eric Lecolinet, Laurent Robert, François Ro...
TOPLAS
2002
98views more  TOPLAS 2002»
14 years 9 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson