Sciweavers

945 search results - page 111 / 189
» Posix: A Model for Future Computing
Sort
View
ENTCS
2008
72views more  ENTCS 2008»
14 years 10 months ago
Towards a Notion of Transaction in Graph Rewriting
We define transactional graph transformation systems (t-gtss), a mild extension of the ordinary framework for the double-pushout approach to graph transformation, which allows to ...
Paolo Baldan, Andrea Corradini, Fernando Luí...
ENVSOFT
2002
82views more  ENVSOFT 2002»
14 years 9 months ago
Radiative perturbation theory: a review
Radiative perturbation theory is a computational technique which can greatly ease the burden of repeated solution of the radiative transfer equation for model atmospheres which di...
Michael A. Box
JUCS
2002
113views more  JUCS 2002»
14 years 9 months ago
The Origins and the Development of the ASM Method for High Level System Design and Analysis
: The research belonging to the Abstract State Machines approach to system design and analysis is surveyed and documented in an annotated ASM bibliography. The survey covers the pe...
Egon Börger
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
14 years 9 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny