Sciweavers

1821 search results - page 244 / 365
» Security-Aware Program Transformations
Sort
View
MASS
2010
110views Communications» more  MASS 2010»
15 years 4 days ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
100
Voted
EUSFLAT
2009
153views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 days ago
A Type-2 Fuzzy Portfolio Selection Problem Considering Possibility Measure and Crisp Possibilistic Mean Value
This paper considers a portfolio selection problem with type-2 fuzzy future returns involving ambiguous and subjectivity. Since this proposed problem is not well-defined due to fuz...
Takashi Hasuike, Hiroaki Ishii
BMCBI
2011
14 years 5 months ago
A Novel And Well-Defined Benchmarking Method For Second Generation Read Mapping
Background: Second generation sequencing technologies yield DNA sequence data at ultra high-throughput. Common to most biological applications is a mapping of the reads to an almo...
Manuel Holtgrewe, Anne-Katrin Emde, David Weese, K...
DAC
1998
ACM
16 years 3 months ago
Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement
Successive, formal refinement is a new approach for specification of embedded systems using a general-purpose programming language. Systems are formally modeled as Abstractable Sy...
James Shin Young, Josh MacDonald, Michael Shilman,...
WWW
2006
ACM
16 years 2 months ago
One document to bind them: combining XML, web services, and the semantic web
We present a paradigm for uniting the diverse strands of XML-based Web technologies by allowing them to be incorporated within a single document. This overcomes the distinction be...
Harry Halpin, Henry S. Thompson