Sciweavers

551 search results - page 55 / 111
» Preventing existence
Sort
View
VL
2007
IEEE
116views Visual Languages» more  VL 2007»
15 years 6 months ago
Mapping the Space of API Design Decisions
When creating new application programming interfaces (APIs), designers must make many decisions. These decisions affect the quality of the resulting APIs in terms of performance (...
Jeffrey Stylos, Brad A. Myers
AIME
2007
Springer
15 years 6 months ago
Hierarchical Latent Class Models and Statistical Foundation for Traditional Chinese Medicine
Traditional Chinese medicine (TCM) is an important avenue for disease prevention and treatment for the Chinese people and is gaining popularity among others. However, many remain s...
Nevin Lianwen Zhang, Shihong Yuan, Tao Chen, Yi Wa...
ESORICS
2007
Springer
15 years 6 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 6 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
ISICA
2007
Springer
15 years 6 months ago
Fast Multi-swarm Optimization with Cauchy Mutation and Crossover Operation
The standard Particle Swarm Optimization (PSO) algorithm is a novel evolutionary algorithm in which each particle studies its own previous best solution and the group’s previous ...
Qing Zhang, Changhe Li, Yong Liu, Lishan Kang