Sciweavers

623 search results - page 67 / 125
» Declarative Network Verification
Sort
View
POPL
2012
ACM
12 years 4 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
GECCO
2007
Springer
137views Optimization» more  GECCO 2007»
14 years 2 months ago
Robust multi-cellular developmental design
This paper introduces a continuous model for Multi-cellular Developmental Design. The cells are fixed on a 2D grid and exchange ”chemicals” with their neighbors during the gr...
Alexandre Devert, Nicolas Bredeche, Marc Schoenaue...
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understand Corporate Rationales for Engaging in Reverse Stock Splits - A Data Mining Application
There has been much written on the individual topics of bankruptcy prediction, corporate performance, and reverse stock splits. However, there is little research into the relation...
Melody Y. Kiang, Dorothy M. Fisher, Steve A. Fishe...
CORR
2006
Springer
142views Education» more  CORR 2006»
13 years 8 months ago
Social Browsing on Flickr
The new social media sites--blogs, wikis, del.icio.us and Flickr, among others--underscore the transformation of the Web to a participatory medium in which users are actively crea...
Kristina Lerman, Laurie Jones
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
14 years 3 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun