Sciweavers

3775 search results - page 566 / 755
» The Expression Problem Revisited
Sort
View
ESORICS
2007
Springer
15 years 11 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 11 months ago
Choice and development
The process of development creates a phenotype from one or more genotypes of an individual through interaction with an environment. The opportunity for development to choose a phe...
Arthur M. Farley
147
Voted
HPCC
2007
Springer
15 years 11 months ago
Adaptive Computation of Self Sorting In-Place FFTs on Hierarchical Memory Architectures
Computing ”in-place and in-order”FFT poses a very difficult problem on hierarchical memory architectures where data movement can seriously degrade the performance. In this pape...
Ayaz Ali, S. Lennart Johnsson, Jaspal Subhlok
ICCSA
2007
Springer
15 years 11 months ago
An Automatic Correction Tool for Relational Algebra Queries
Abstract. Relational algebra is one of the main topics covered in undergraduate computer science database courses. In this paper, we present a web-based tool designed to automatica...
Josep Soler, Imma Boada, Ferran Prados, Jordi Poch...
ICFCA
2007
Springer
15 years 11 months ago
Computing Intensions of Digital Library Collections
We model a Digital Library as a formal context in which objects are documents and attributes are terms describing documents contents. A formal concept is very close to the notion o...
Carlo Meghini, Nicolas Spyratos