Sciweavers

2179 search results - page 427 / 436
» Symmetry within Solutions
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 5 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
TDSC
2010
218views more  TDSC 2010»
13 years 5 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TKDE
2010
274views more  TKDE 2010»
13 years 5 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
ACSAC
2010
IEEE
13 years 5 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
ICCBR
2010
Springer
13 years 5 months ago
Taxonomic Semantic Indexing for Textual Case-Based Reasoning
Abstract. Case-Based Reasoning (CBR) solves problems by reusing past problemsolving experiences maintained in a casebase. The key CBR knowledge container therefore is its casebase....
Juan A. Recio-García, Nirmalie Wiratunga