Sciweavers

5326 search results - page 35 / 1066
» On what we can ensure
Sort
View
107
Voted
TCS
2008
15 years 13 days ago
Integration of a security type system into a program logic
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensu...
Reiner Hähnle, Jing Pan, Philipp Rümmer,...
105
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
95
Voted
BRAIN
2009
Springer
15 years 7 months ago
Reading What Machines "Think"
Abstract. In this paper, we want to farther advance the parallelism between models of the brain and computing machines. We want to apply the same idea underlying neuroimaging techn...
Fabio Massimo Zanzotto, Danilo Croce
117
Voted
KBSE
2000
IEEE
15 years 5 months ago
Practical Large Scale What-If Queries: Case Studies with Software Risk Assessment
When a lack of data inhibits decision making, large scale what-if queries can be conducted over the uncertain parameter ranges. Such what-if queries can generate an overwhelming a...
Tim Menzies, Erik Sinsel
112
Voted
CIDR
2003
121views Algorithms» more  CIDR 2003»
15 years 1 months ago
Towards High Performance Peer-to-Peer Content and Resource Sharing Systems
Peer-to-peer sharing systems are becoming increasingly popular and an exciting new class of innovative, internet-based data management systems. In these systems, users contribute ...
Peter Triantafillou, Chryssani Xiruhaki, Manolis K...