Sciweavers

511 search results - page 86 / 103
» Finite System Composition and Interaction
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CN
1998
77views more  CN 1998»
13 years 7 months ago
Modelling and simulation of the tongue during laryngoscopy
The main aim of our work is to create a realistic model of the behaviour of the upper airways during laryngoscopy. In this procedure the anaesthetist uses a rigid blade to displac...
Maria Andréia F. Rodrigues, Duncan Fyfe Gil...
STEP
2003
IEEE
14 years 24 days ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ICCAD
1996
IEEE
127views Hardware» more  ICCAD 1996»
13 years 11 months ago
Comparing models of computation
We give a denotational framework (a "meta model") within which certain properties of models of computation can be understood and compared. It describes concurrent proces...
Edward A. Lee, Alberto L. Sangiovanni-Vincentelli
LCTRTS
2005
Springer
14 years 1 months ago
Composable code generation for distributed giotto
Abstract. We present a compositional approach to the implementation of hard real-time software running on a distributed platform. We explain how several code suppliers, coordinated...
Thomas A. Henzinger, Christoph M. Kirsch, Slobodan...