Sciweavers

256 search results - page 13 / 52
» What Makes a Good Answer
Sort
View
NORDSEC
2009
Springer
14 years 2 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
INFOCOM
2008
IEEE
14 years 1 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
DAGSTUHL
2006
13 years 9 months ago
A Taxonomy of Aspects in Terms of Crosscutting Concerns
Abstract. Aspect-orientation provides support for " Separation of Concerns" by means of techniques that first isolate and then weave concerns. Most work in aspect-orienta...
Jorge Fox
SYNTHESE
2010
59views more  SYNTHESE 2010»
13 years 5 months ago
Frege's Begriffsschrift as a lingua characteristica
In this paper I suggest an answer to the question of what Frege means when he says that his logical system, the Begriffsschrift, is like the language Leibniz sketched, a lingua ch...
Tapio Korte
ADC
2000
Springer
182views Database» more  ADC 2000»
13 years 11 months ago
Efficient Range Query Retrieval for Non-Uniform Data Distributions
Answering range queries is a common database operation. Methods based on hashing techniques to minimise the cost of answering range queries by taking the query distribution into a...
Salahadin Mohammed, Evan P. Harris, Kotagiri Ramam...