Sciweavers

1342 search results - page 224 / 269
» Ordered Programs as Abductive Systems
Sort
View
COMCOM
2006
78views more  COMCOM 2006»
13 years 8 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo
CCS
2011
ACM
12 years 8 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
EUROSYS
2010
ACM
14 years 2 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
MICCAI
2003
Springer
14 years 9 months ago
VETOT, Volume Estimation and Tracking Over Time: Framework and Validation
We have implemented an effective and publicly available tool, VETOT, to track and quantify the evolution of tumors and organs over time. VETOT includes a framework both for registr...
Jean-Philippe Guyon, Mark Foskey, Jisung Kim, Zeyn...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan