Sciweavers

1527 search results - page 139 / 306
» What About Wednesday
Sort
View
IH
2007
Springer
14 years 4 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
MDAI
2007
Springer
14 years 4 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
SSS
2007
Springer
14 years 4 months ago
Self-stabilization and Virtual Node Layer Emulations
We present formal definitions of stabilization for the Timed I/O Automata (TIOA) framework, and of emulation for the timed Virtual Stationary Automata programming abstraction laye...
Tina Nolte, Nancy A. Lynch
VLDB
2007
ACM
144views Database» more  VLDB 2007»
14 years 4 months ago
A Relational Approach to Incrementally Extracting and Querying Structure in Unstructured Data
There is a growing consensus that it is desirable to query over the structure implicit in unstructured documents, and that ideally this capability should be provided incrementally...
Eric Chu, Akanksha Baid, Ting Chen, AnHai Doan, Je...
WER
2007
Springer
14 years 4 months ago
Towards Variability Design as Decision Boundary Placement
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...
Catalin Bidian, Eric S. K. Yu