Sciweavers

1886 search results - page 220 / 378
» Verifying and Validating Simulation Models
Sort
View
PLDI
2009
ACM
16 years 3 months ago
A decision procedure for subset constraints over regular languages
Reasoning about string variables, in particular program inputs, is an important aspect of many program analyses and testing frameworks. Program inputs invariably arrive as strings...
Pieter Hooimeijer, Westley Weimer
SIGMOD
2006
ACM
174views Database» more  SIGMOD 2006»
16 years 3 months ago
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to acce...
Feifei Li, Marios Hadjieleftheriou, George Kollios...
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
DCC
2008
IEEE
16 years 2 months ago
Object-Based Regions of Interest for Image Compression
A fully automated architecture for object-based region of interest (ROI) detection is proposed. ROI's are defined as regions containing user defined objects of interest, and ...
Sunhyoung Han, Nuno Vasconcelos
ICWS
2009
IEEE
16 years 7 days ago
An Approach to Incentive-Based Reputation for Communities of Web Services
—Community of web services (CWS) is a society composed by a number of functionally identical web services. The communities always aim to increase their reputation level in order ...
Babak Khosravifar, Jamal Bentahar, Philippe Thiran...