Sciweavers

11328 search results - page 2206 / 2266
» Timed Branching Processes
Sort
View
ICFP
2010
ACM
15 years 28 days ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
GPC
2008
Springer
15 years 28 days ago
A Pragmatic Approach for the Semantic Description and Matching of Pervasive Resources
The increasing popularity of personal wireless devices has raised new demands for the efficient discovery of heterogeneous devices and services in pervasive environments. With the...
Ayomi Bandara, Terry R. Payne, David De Roure, Nic...
AAAI
2010
15 years 2 days ago
Computing Cost-Optimal Definitely Discriminating Tests
The goal of testing is to discriminate between multiple hypotheses about a system--for example, different fault diagnoses--by applying input patterns and verifying or falsifying t...
Anika Schumann, Jinbo Huang, Martin Sachenbacher
DOCENG
2010
ACM
15 years 2 days ago
Next generation typeface representations: revisiting parametric fonts
Outline font technology has long been established as the standard way to represent typefaces, allowing characters to be represented independently of print size and resolution. Alt...
Tamir Hassan, Changyuan Hu, Roger D. Hersch
CCS
2010
ACM
15 years 2 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
« Prev « First page 2206 / 2266 Last » Next »