Sciweavers

150 search results - page 20 / 30
» Counting Results in Weak Formalisms
Sort
View
CSC
2006
13 years 10 months ago
B-Splines for Genomic Signatures
- A variety of data analysis concerned with genome sequences support the proposal that each living organism owns a genomic signature. Classical approaches to the genomic signature ...
Gennaro Iaccarino, Filomena de Santis
CCS
2008
ACM
13 years 10 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ER
2000
Springer
151views Database» more  ER 2000»
14 years 12 days ago
Algebraic Database Migration to Object Technology
Relational database systems represent the current standard technology for implementing database applications. Now that the object-oriented paradigm becomes more and more mature in...
Andreas Behm, Andreas Geppert, Klaus R. Dittrich
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 8 months ago
Model Checking Synchronized Products of Infinite Transition Systems
Formal verification using the model checking paradigm has to deal with two aspects: The system models are structured, often as products of components, and the specification logic...
Stefan Wöhrle, Wolfgang Thomas