Sciweavers

3337 search results - page 465 / 668
» interactions 2006
Sort
View
JALC
2006
125views more  JALC 2006»
13 years 9 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
JAR
2006
99views more  JAR 2006»
13 years 9 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
JCC
2006
58views more  JCC 2006»
13 years 9 months ago
On the reversible O2 binding of the Fe-porphyrin complex
: Electronic mechanism of the reversible O2 binding by heme was studied by using Density Functional Theory calculations. The ground state of oxyheme was calculated to be open singl...
Hiroyuki Nakashima, Jun-Ya Hasegawa, Hiroshi Nakat...
JCM
2006
135views more  JCM 2006»
13 years 9 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...
JIIS
2006
119views more  JIIS 2006»
13 years 9 months ago
Answering constraint-based mining queries on itemsets using previous materialized results
Abstract In recent years, researchers have begun to study inductive databases, a new generation of databases for leveraging decision support applications. In this context, the user...
Roberto Esposito, Rosa Meo, Marco Botta