Sciweavers

511 search results - page 86 / 103
» Finite System Composition and Interaction
Sort
View
141
Voted
ESORICS
2006
Springer
15 years 7 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CN
1998
77views more  CN 1998»
15 years 3 months ago
Modelling and simulation of the tongue during laryngoscopy
The main aim of our work is to create a realistic model of the behaviour of the upper airways during laryngoscopy. In this procedure the anaesthetist uses a rigid blade to displac...
Maria Andréia F. Rodrigues, Duncan Fyfe Gil...
159
Voted
STEP
2003
IEEE
15 years 8 months ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
118
Voted
ICCAD
1996
IEEE
127views Hardware» more  ICCAD 1996»
15 years 7 months ago
Comparing models of computation
We give a denotational framework (a "meta model") within which certain properties of models of computation can be understood and compared. It describes concurrent proces...
Edward A. Lee, Alberto L. Sangiovanni-Vincentelli
LCTRTS
2005
Springer
15 years 9 months ago
Composable code generation for distributed giotto
Abstract. We present a compositional approach to the implementation of hard real-time software running on a distributed platform. We explain how several code suppliers, coordinated...
Thomas A. Henzinger, Christoph M. Kirsch, Slobodan...