Sciweavers

416 search results - page 41 / 84
» Some new approaches for preventing software tampering
Sort
View
BIB
2002
136views more  BIB 2002»
15 years 1 months ago
Technologies for Integrating Biological Data
The process of building a new database relevant to some field of study in biomedicine involves transforming, integrating, and cleansing multiple data sources, as well as adding ne...
L. Wong
ENTCS
2006
180views more  ENTCS 2006»
15 years 1 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
POPL
2005
ACM
16 years 1 months ago
Permission accounting in separation logic
A lightweight logical approach to race-free sharing of heap storage between concurrent threads is described, based on the notion of permission to access. Transfer of permission be...
Richard Bornat, Cristiano Calcagno, Peter W. O'Hea...
ANOR
2011
175views more  ANOR 2011»
14 years 8 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...
IJAR
2008
83views more  IJAR 2008»
15 years 1 months ago
Decision-theoretic specification of credal networks: A unified language for uncertain modeling with sets of Bayesian networks
Credal networks are models that extend Bayesian nets to deal with imprecision in probability, and can actually be regarded as sets of Bayesian nets. Credal nets appear to be power...
Alessandro Antonucci, Marco Zaffalon