Sciweavers

1941 search results - page 346 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
ICTCS
2007
Springer
15 years 6 months ago
Weak Markovian Bisimilarity: Abstracting from Prioritized/Weighted Internal Immediate Actions
ing from Prioritized/Weighted Internal Immediate Actions Marco Bernardo and Alessandro Aldini Universit`a di Urbino “Carlo Bo” – Italy Markovian process calculi constitute a ...
Marco Bernardo, Alessandro Aldini
CHI
2011
ACM
14 years 3 months ago
Side effects and "gateway" tools: advocating a broader look at evaluating persuasive systems
This paper argues for evaluating the impact of persuasive systems on users beyond metrics that focus on system usage, based on an interview study of 16 Wii Fit users. While explor...
Victoria Schwanda, Steven Ibara, Lindsay Reynolds,...
DAC
2000
ACM
16 years 25 days ago
Formal verification of iterative algorithms in microprocessors
Contemporary microprocessors implement many iterative algorithms. For example, the front-end of a microprocessor repeatedly fetches and decodes instructions while updating interna...
Mark Aagaard, Robert B. Jones, Roope Kaivola, Kath...
CCS
2009
ACM
16 years 14 days ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 8 days ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...