Sciweavers

316 search results - page 62 / 64
» Where do security policies come from
Sort
View
PLDI
2003
ACM
13 years 11 months ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
ETELEMED
2009
IEEE
171views Healthcare» more  ETELEMED 2009»
14 years 1 months ago
Drivers and Challenges of Wireless Solutions in Future Healthcare
What do IT oriented healthcare people think to be most attractive and credible wireless applications in healthcare? What do they think about the challenges? These questions were p...
Esko Alasaarela, Ravi Nemana, Steven DeMello
AI
2010
Springer
13 years 3 months ago
Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such...
James Pita, Manish Jain, Milind Tambe, Fernando Or...
IOR
2006
192views more  IOR 2006»
13 years 6 months ago
Exact Simulation of Stochastic Volatility and Other Affine Jump Diffusion Processes
The stochastic differential equations for affine jump diffusion models do not yield exact solutions that can be directly simulated. Discretization methods can be used for simulati...
Mark Broadie, Özgür Kaya
CHI
2002
ACM
14 years 6 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger