Sciweavers

1829 search results - page 83 / 366
» aims 2008
Sort
View
CSSC
2008
75views more  CSSC 2008»
15 years 4 months ago
Statistical Certification of Software Systems
Common software release procedures based on statistical techniques try to optimise the trade-off between further testing costs and costs due to remaining errors. We propose new so...
Alessandro Di Bucchianico, Jan Friso Groote, Kees ...
DAM
2008
70views more  DAM 2008»
15 years 4 months ago
Pairings for cryptographers
Many research papers in pairing based cryptography treat pairings as a "black box". These papers build cryptographic schemes making use of various properties of pairings....
Steven D. Galbraith, Kenneth G. Paterson, Nigel P....
DATAMINE
2008
89views more  DATAMINE 2008»
15 years 4 months ago
Mining conjunctive sequential patterns
Abstract. In this paper we aim at extending the non-derivable condensed representation in frequent itemset mining to sequential pattern mining. We start by showing a negative examp...
Chedy Raïssi, Toon Calders, Pascal Poncelet
DISOPT
2008
118views more  DISOPT 2008»
15 years 4 months ago
Approximation algorithm for minimizing total latency in machine scheduling with deliveries
We study the problem of minimizing total latency in machine scheduling with deliveries, which is defined as follows. There is a set of n jobs to be processed by a single machine a...
Asaf Levin, Michal Penn
ENTCS
2008
150views more  ENTCS 2008»
15 years 4 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...