Sciweavers

5378 search results - page 1013 / 1076
» Base Logics in Argumentation
Sort
View
ICFP
2005
ACM
14 years 8 months ago
A computational approach to reflective meta-reasoning about languages with bindings
We present a foundation for a computational meta-theory of languages with bindings implemented in a computer-aided formal reasoning environment. Our theory provides the ability to...
Aleksey Nogin, Alexei Kopylov, Xin Yu, Jason Hicke...
MOBISYS
2008
ACM
14 years 8 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
14 years 5 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
ICCAD
2003
IEEE
148views Hardware» more  ICCAD 2003»
14 years 5 months ago
The Compositional Far Side of Image Computation
Symbolic image computation is the most fundamental computation in BDD-based sequential system optimization and formal verification. In this paper, we explore the use of over-appr...
Chao Wang, Gary D. Hachtel, Fabio Somenzi
SAC
2010
ACM
14 years 3 months ago
SE-155 DBSA: a device-based software architecture for data mining
In this paper a new architecture for a variety of data mining tasks is introduced. The Device-Based Software Architecture (DBSA) is a highly portable and generic data mining softw...
Janne Kätevä, Perttu Laurinen, Taneli Ra...
« Prev « First page 1013 / 1076 Last » Next »