Sciweavers

6274 search results - page 937 / 1255
» Proofs, Programs, Processes
Sort
View
103
Voted
ECOI
2006
59views more  ECOI 2006»
15 years 3 months ago
Model-building with interpolated temporal data
Ecological data can be difficult to collect, and as a result, some important temporal ecological datasets contain irregularly sampled data. Since many temporal modelling technique...
Robert I. McKay, Tuan Hao Hoang, Naoki Mori, Nguye...
123
Voted
IJISEC
2008
119views more  IJISEC 2008»
15 years 3 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
JUCS
2008
138views more  JUCS 2008»
15 years 3 months ago
A Lightweight and Extensible AspectJ Implementation
Abstract: Extending AspectJ to experiment with new language features can be cumbersome, even with an extensible implementation. Often, a language designer only needs a rapid protot...
Rodolfo Toledo, Éric Tanter
JMM2
2006
80views more  JMM2 2006»
15 years 3 months ago
Implementing Holistic Dimensions for a Facial Composite System
Facial composites are pictures of human faces. These are normally constructed by victims and witnesses of crime who describe a suspect's face and then select individual facial...
Charlie D. Frowd, Vicki Bruce, Alex H. McIntyre, D...
JPDC
2006
83views more  JPDC 2006»
15 years 3 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit