Sciweavers

3931 search results - page 740 / 787
» Separation logic and abstraction
Sort
View
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
15 years 3 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
ATAL
2005
Springer
15 years 3 months ago
A scalable approach to multi-agent resource acquisition and control
Scalable coordination is a key challenge in deployment of multiagent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs i...
Nadeem Jamali, Xinghui Zhao
EVOW
2005
Springer
15 years 3 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
RAID
2005
Springer
15 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
UML
2005
Springer
15 years 3 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu