Sciweavers

1003 search results - page 44 / 201
» It's life Jim, but not as we know it!
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 8 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
CBSE
2007
Springer
14 years 2 months ago
Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL
Abstract. The SOAP Service Description Language (SSDL) is a SOAPcentric language for describing Web Service contracts. SSDL focuses on abstraction as the building block for creatin...
Patric Fornasier, Jim Webber, Ian Gorton
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
14 years 1 months ago
Information Technology, Responsibility, and Anthropology
Information technology is one potential object of responsibility as we know from texts about computer ethics, information ethics etc. This article aims to demonstrate that the eth...
Bernd Carsten Stahl
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 9 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
ECCV
2010
Springer
14 years 1 months ago
Energy Minimization Under Constraints on Label Counts
Abstract. Many computer vision problems such as object segmentation or reconstruction can be formulated in terms of labeling a set of pixels or voxels. In certain scenarios, we may...