Sciweavers

3821 search results - page 228 / 765
» A Security Model for Aglets
Sort
View
OOPSLA
1989
Springer
14 years 1 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
AGENTS
2000
Springer
14 years 1 months ago
From one virtual actor to virtual crowds: requirements and constraints
A crowd is not only a group of many individuals. Crowd modelling involves problems that arise only when we focus on crowds. For instance, avoiding collision problems related to a ...
Soraia Raupp Musse, Daniel Thalmann
UML
2005
Springer
14 years 3 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
CISS
2011
IEEE
13 years 1 months ago
New hypothesis testing-based methods for fault detection for smart grid systems
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...
Qian He, Rick S. Blum
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 9 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...