Sciweavers

9425 search results - page 1687 / 1885
» Some Notes on Models and Modelling
Sort
View
138
Voted
ECSQARU
2007
Springer
15 years 7 months ago
Approaches to Constructing a Stratified Merged Knowledge Base
Many merging operators have been proposed to merge either flat or stratified knowledge bases. The result of merging by such an operator is a flat base (or a set of models of the me...
Anbu Yue, Weiru Liu, Anthony Hunter
128
Voted
EMSOFT
2007
Springer
15 years 7 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
135
Voted
ICDCS
2010
IEEE
15 years 7 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
156
Voted
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
15 years 7 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
134
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 7 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
« Prev « First page 1687 / 1885 Last » Next »