Sciweavers

12487 search results - page 2456 / 2498
» Graspable Work Modeling
Sort
View
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
GECCO
2008
Springer
154views Optimization» more  GECCO 2008»
13 years 9 months ago
Automated shape composition based on cell biology and distributed genetic programming
Motivated by the ability of living cells to form specific shapes and structures, we present a computational approach using distributed genetic programming to discover cell-cell i...
Linge Bai, Manolya Eyiyurekli, David E. Breen
HASKELL
2008
ACM
13 years 9 months ago
Haskell: batteries included
The quality of a programming language itself is only one component in the ability of application writers to get the job done. Programming languages can succeed or fail based on th...
Duncan Coutts, Isaac Potoczny-Jones, Don Stewart
ACMDIS
2010
ACM
13 years 8 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
APLAS
2010
ACM
13 years 8 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
« Prev « First page 2456 / 2498 Last » Next »