Sciweavers

1448 search results - page 209 / 290
» Restricted Stack Implementations
Sort
View
TOOLS
2008
IEEE
14 years 2 months ago
Ownership, Uniqueness, and Immutability
Programming in an object-oriented language demands a fine balance between high degrees of expressiveness and control. At one level, we need to permit objects to interact freely t...
Johan Östlund, Tobias Wrigstad, Dave Clarke, ...
CEC
2007
IEEE
14 years 2 months ago
SAT-decoding in evolutionary algorithms for discrete constrained optimization problems
— For complex optimization problems, several population-based heuristics like Multi-Objective Evolutionary Algorithms have been developed. These algorithms are aiming to deliver ...
Martin Lukasiewycz, Michael Glaß, Christian ...
DSN
2007
IEEE
14 years 2 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
14 years 2 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...