Sciweavers

714 search results - page 106 / 143
» Verification and Compliance Testing
Sort
View
EDBT
2008
ACM
113views Database» more  EDBT 2008»
14 years 8 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar
WWW
2009
ACM
14 years 3 months ago
Reliability analysis using weighted combinational models for web-based software
In the past, some researches suggested that engineers can use combined software reliability growth models (SRGMs) to obtain more accurate reliability prediction during testing. In...
Chao-Jung Hsu, Chin-Yu Huang
ICDAR
2009
IEEE
14 years 3 months ago
A Set of Chain Code Based Features for Writer Recognition
This communication presents an effective method for writer recognition in handwritten documents. We have introduced a set of features that are extracted from the contours of handw...
Imran Siddiqi, Nicole Vincent
CSFW
2007
IEEE
14 years 3 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
IMSCCS
2006
IEEE
14 years 2 months ago
A New Scheduling Algorithm for Servers
Slowdown is used to measure the fairness degree of a scheduling algorithm in existing work. However, the fairness degree should be considered within a scheduling algorithm; rather...
Nianmin Yao, Wenbin Yao, Shaobin Cai, Jun Ni