Sciweavers

984 search results - page 82 / 197
» ideas 2010
Sort
View
FCSC
2010
170views more  FCSC 2010»
15 years 1 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li
140
Voted
FIRSTMONDAY
2010
125views more  FIRSTMONDAY 2010»
15 years 1 months ago
The social environment model: Small heroes and the evolution of human society
Traditional "realistic" theories of social action, whether based on the individual gain heuristics of capitalism or the collective class struggles of communism, cannot e...
Brian Whitworth, Alex P. Whitworth
FUIN
2010
103views more  FUIN 2010»
15 years 1 months ago
Automation for Dependently Typed Functional Programming
Abstract. Writing dependently typed functional programs that capture non-trivial program properties, such as those involving membership, ordering and non-linear arithmetic, is diff...
Sean Wilson, Jacques D. Fleuriot, Alan Smaill
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IJDLS
2010
108views more  IJDLS 2010»
15 years 1 months ago
Sampling the Web as Training Data for Text Classification
Data acquisition is a major concern in text classification. The excessive human efforts required by conventional methods to build up quality training collection might not always b...
Wei-Yen Day, Chun-Yi Chi, Ruey-Cheng Chen, Pu-Jen ...