Sciweavers

1875 search results - page 366 / 375
» Modeling the Security of Steganographic Systems
Sort
View
PLDI
2003
ACM
14 years 3 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
13 years 19 days ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
AINA
2010
IEEE
14 years 2 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
MOBISYS
2010
ACM
14 years 4 days ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
WSC
1998
13 years 11 months ago
Avoiding the Blues for Airline Travelers
The fast growth in airline passenger traffic combined with the slow growth in airport capacity worldwide is putting a severe strain on the capability of airlines to adapt their pr...
Jane L. Snowdon, Soad El-Taji, Mario Montevecchi, ...