Sciweavers

2534 search results - page 448 / 507
» A Type System for the Push-Enter Model
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
HIPS
1998
IEEE
13 years 12 months ago
Constructive and Adaptable Distributed Shared Memory
Distributed shared memory (DSM) is a paradigm for programming distributed systems, which provides an alternative to the message passing model. DSM offers the agents of the system ...
Jordi Bataller, José M. Bernabéu-Aub...
ICCV
2005
IEEE
14 years 9 months ago
Active Search for Real-Time Vision
In most cases when information is to be extracted from an image, there are priors available on the state of the world and therefore on the detailed measurements which will be obta...
Andrew J. Davison
GIS
2009
ACM
14 years 8 months ago
Web 2.0 Geospatial Visual Analytics for Improved Urban Flooding Situational Awareness and Assessment
Situational awareness of urban flooding during storm events is important for disaster and emergency management. However, no general purpose tools yet exist for rendering rainfall ...
Alejandro Rodríguez, David Hill, Jim Myers,...
WWW
2009
ACM
14 years 8 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...