Sciweavers

470 search results - page 45 / 94
» The Foundations for Provenance on the Web
Sort
View
SAC
2009
ACM
14 years 3 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin
LICS
2007
IEEE
14 years 3 months ago
Principles of Superdeduction
In predicate logic, the proof that a theorem P holds in a theory Th is typically conducted in natural deduction or in the sequent calculus using all the information contained in t...
Paul Brauner, Clément Houtmann, Claude Kirc...
ACSAC
2005
IEEE
14 years 2 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
GECCO
2004
Springer
212views Optimization» more  GECCO 2004»
14 years 2 months ago
An Evolutionary Autonomous Agent with Visual Cortex and Recurrent Spiking Columnar Neural Network
Spiking neural networks are computationally more powerful than conventional artificial neural networks. Although this fact should make them especially desirable for use in evoluti...
Rich Drewes, James B. Maciokas, Sushil J. Louis, P...
SIGCSE
2010
ACM
150views Education» more  SIGCSE 2010»
14 years 2 months ago
Expanding the frontiers of computer science: designing a curriculum to reflect a diverse field
While the discipline of computing has evolved significantly in the past 30 years, Computer Science curricula have not as readily adapted to these changes. In response, we have rec...
Mehran Sahami, Alex Aiken, Julie Zelenski