Sciweavers

1522 search results - page 86 / 305
» Practical Exception Specifications
Sort
View
CACM
1998
103views more  CACM 1998»
15 years 1 months ago
The Virtual Design Team
The long range goal of the “Virtual Design Team” (VDT) research program is to develop computational tools to analyze decision making and communication behavior and thereby to ...
John C. Kunz, Tore R. Christiansen, Geoff P. Cohen...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 11 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CORR
2010
Springer
174views Education» more  CORR 2010»
14 years 11 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
BMCBI
2010
121views more  BMCBI 2010»
14 years 8 months ago
G-stack modulated probe intensities on expression arrays - sequence corrections and signal calibration
Background: The brightness of the probe spots on expression microarrays intends to measure the abundance of specific mRNA targets. Probes with runs of at least three guanines (G) ...
Mario Fasold, Peter F. Stadler, Hans Binder
CSCW
2010
ACM
15 years 10 months ago
The individual and the group in console gaming
In this paper, we present results from a study of collocated group console gaming. We focus, in particular, on observed gaming practices that emphasized the individual gamer withi...
Amy Voida, M. Sheelagh T. Carpendale, Saul Greenbe...