Sciweavers

248 search results - page 48 / 50
» A Unifying Model of Variables and Names
Sort
View
POPL
2012
ACM
12 years 2 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
WWW
2008
ACM
14 years 8 months ago
Analyzing search engine advertising: firm behavior and cross-selling in electronic markets
The phenomenon of sponsored search advertising is gaining ground as the largest source of revenues for search engines. Firms across different industries have are beginning to adop...
Anindya Ghose, Sha Yang
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 7 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
ISSTA
2000
ACM
13 years 11 months ago
Testability, fault size and the domain-to-range ratio: An eternal triangle
A number of different concepts have been proposed that, loosely speaking, revolve around the notion of software testability. Indeed, the concept of testability itself has been int...
Martin R. Woodward, Zuhoor A. Al-Khanjari
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
A New Phase Transition for Local Delays in MANETs
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
François Baccelli, Bartek Blaszczyszyn