Sciweavers

1888 search results - page 203 / 378
» Proof theory and computational analysis
Sort
View
DAGSTUHL
2001
15 years 2 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
209
Voted

Book
2818views
16 years 10 months ago
Introduction To Digital Filters With Audio Applications
"This book was written for my introductory course in digital audio signal processing, which I have given at the Center for Computer Research in Music and Acoustics (CCRMA) sin...
Julius O. Smith III
114
Voted
PODC
2010
ACM
15 years 4 months ago
Brief announcement: complexity and solution of the send-receive correlation problem
During the analysis of packet log files from network experiments, the question arises which received packet belongs to which of the potentially many binary identical send events....
Benito van der Zander, Egon Wanke, Wolfgang Kie&sz...
110
Voted
GRC
2008
IEEE
15 years 1 months ago
Fuzzy Preference Relation Rough Sets
Preference analysis is a class of important tasks in multi-criteria decision making. The classical rough set theory was generalized to deal with preference analysis by replacing e...
Qinghua Hu, Daren Yu, Congxin Wu
132
Voted
PODS
2006
ACM
217views Database» more  PODS 2006»
16 years 29 days ago
A simpler and more efficient deterministic scheme for finding frequent items over sliding windows
In this paper, we give a simple scheme for identifying approximate frequent items over a sliding window of size n. Our scheme is deterministic and does not make any assumption on ...
Lap-Kei Lee, H. F. Ting