Sciweavers

5344 search results - page 124 / 1069
» Privacy-Preserving Set Operations
Sort
View
107
Voted
IPPS
2006
IEEE
15 years 8 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 7 months ago
Issues in Rational Planning in Multi-Agent Settings
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents operating in multi-agent environments. We use the...
Piotr J. Gmytrasiewicz
122
Voted
PKDD
1999
Springer
118views Data Mining» more  PKDD 1999»
15 years 6 months ago
Mining Possibilistic Set-Valued Rules by Generating Prime Disjunctions
We describe the problem of mining possibilistic set-valued rules in large relational tables containing categorical attributes taking a finite number of values. An example of such a...
Alexandr A. Savinov
138
Voted
MICRO
1994
IEEE
99views Hardware» more  MICRO 1994»
15 years 6 months ago
Data relocation and prefetching for programs with large data sets
Numerical applications frequently contain nested loop structures that process large arrays of data. The execution of these loop structures often produces memory preference pattern...
Yoji Yamada, John Gyllenhall, Grant Haab, Wen-mei ...
ICSE
2000
IEEE-ACM
15 years 6 months ago
A software engineering approach and tool set for developing Internet applications
If a business built a plant to produce products without first designing a process to manufacture them, the risk would be lack of capacity without significant plant redesign. Simil...
David A. Marca, Beth A. Perdue