Sciweavers

943 search results - page 87 / 189
» Writing Information into DNA
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
ECLIPSE
2004
ACM
15 years 10 months ago
MEProf: modular extensible profiling for Eclipse
This paper presents a profiling plug-in for IBM’s Eclipse development environment. Our approach characterises profiling as an interactive exploration of a large virtual database...
Marc Hull, Olav Beckmann, Paul H. J. Kelly
SIGIR
2004
ACM
15 years 10 months ago
Sentence completion
We discuss a retrieval model in which the task is to complete a sentence, given an initial fragment, and given an application specific document collection. This model is motivate...
Korinna Grabski, Tobias Scheffer
C5
2010
IEEE
15 years 9 months ago
CodeTalk
—Contemporary development environments do not directly and explicitly support developers in having a conversation about the code they write and maintain. This problem is aggravat...
Bastian Steinert, Marcel Taeumel, Jens Lincke, Tob...
CL
2000
Springer
15 years 8 months ago
Proving Failure in Functional Logic Programs
How to extract negative information from programs is an important issue in logic programming. Here we address the problem for functional logic programs, from a proof-theoretic pers...
Francisco Javier López-Fraguas, Jaime S&aac...