Sciweavers

727 search results - page 61 / 146
» ads 2004
Sort
View
CAISE
2004
Springer
15 years 6 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
141
Voted
CIS
2004
Springer
15 years 6 months ago
Representation of the Signal Transduction with Aberrance Using Ipi Calculus
The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interfe...
Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Li...
GECCO
2004
Springer
120views Optimization» more  GECCO 2004»
15 years 6 months ago
Comparison of Selection Strategies for Evolutionary Quantum Circuit Design
Evolution of quantum circuits faces two major challenges: complex and huge search spaces and the high costs of simulating quantum circuits on conventional computers. In this paper ...
André Leier, Wolfgang Banzhaf
83
Voted
IFL
2004
Springer
15 years 6 months ago
The Feasibility of Interactively Probing Quiescent Properties of GUI Applications
In this paper we explore how application-users can, in an interactive way, test properties about the state of GUI applications that can be classified as local state transition sys...
Peter Achten
MWCN
2004
Springer
15 years 6 months ago
On Selecting Nodes to Improve Estimated Positions
— We consider node localization problems in ad hoc wireless networks in which two types of nodes are considered: nodes with self-locating capability like GPS and nodes with no se...
Erwan Ermel, Anne Fladenmuller, Guy Pujolle, Andr&...