Sciweavers

691 search results - page 118 / 139
» Programming Open Systems with Agents, Environments and Organ...
Sort
View
AAAI
1990
13 years 9 months ago
A Proven Domain-Independent Scientific Function-Finding Algorithm
Programs such as Bacon, Abacus, Coper, Kepler and others are designed to find functional relationships of scientific significance in numerical data without relying on the deep dom...
Cullen Schaffer
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
MM
2006
ACM
169views Multimedia» more  MM 2006»
14 years 1 months ago
Browsing personal media archives with spatial context using panoramas
This paper presents novel techniques for using panoramas as spatial context to enhance browsing of personal media archives. This context, scenes where frequent media capture takes...
Brett Adams, Stewart Greenhill, Svetha Venkatesh
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
POS
1998
Springer
14 years 4 days ago
Concurrency - The Fly in the Ointment?
Concurrency is a central pillar of the Java programming language, is implicit in the transactional model of computation adopted by most persistent systems, and has been widely stu...
Stephen Blackburn, John N. Zigman