Sciweavers

474 search results - page 77 / 95
» A Framework for Comparing Type Systems for Database Programm...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
TCS
2010
13 years 7 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
CLEF
2008
Springer
13 years 10 months ago
Overview of the ImageCLEFphoto 2008 Photographic Retrieval Task
ImageCLEFphoto 2008 is an ad-hoc photo retrieval task and part of the ImageCLEF evaluation campaign. This task provides both the resources and the framework necessary to perform c...
Thomas Arni, Paul Clough, Mark Sanderson, Michael ...
CPHYSICS
2006
127views more  CPHYSICS 2006»
13 years 8 months ago
GenAnneal: Genetically modified Simulated Annealing
A modification of the standard Simulated Annealing (SA) algorithm is presented for finding the global minimum of a continuous multidimensional, multimodal function. We report resu...
Ioannis G. Tsoulos, Isaac E. Lagaris
CPHYSICS
2006
182views more  CPHYSICS 2006»
13 years 8 months ago
MinFinder: Locating all the local minima of a function
A new stochastic clustering algorithm is introduced that aims to locate all the local minima of a multidimensional continuous and differentiable function inside a bounded domain. ...
Ioannis G. Tsoulos, Isaac E. Lagaris