Sciweavers

2270 search results - page 385 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
142
Voted
JFP
2008
125views more  JFP 2008»
15 years 3 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
168
Voted
IJITN
2010
177views more  IJITN 2010»
15 years 1 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
131
Voted
CSCW
2006
ACM
15 years 9 months ago
Don't look stupid: avoiding pitfalls when recommending research papers
If recommenders are to help people be more productive, they need to support a wide variety of real-world information seeking tasks, such as those found when seeking research paper...
Sean M. McNee, Nishikant Kapoor, Joseph A. Konstan
PPPJ
2003
ACM
15 years 9 months ago
An examination of the run-time performance of GUI creation frameworks
The graphical user interface (GUI) is an important component of many software systems. Past surveys indicate that the development of a GUI is a significant undertaking and that t...
Christopher J. Howell, Gregory M. Kapfhammer, Robe...
139
Voted
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 7 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter