Sciweavers

CORR
2011
Springer
165views Education» more  CORR 2011»
13 years 6 months ago
On the Semantics of Purpose Requirements in Privacy Policies
Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital ...
Michael Carl Tschantz, Anupam Datta, Jeannette M. ...
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 6 months ago
Theory of Atomata
Janusz A. Brzozowski, Hellis Tamm
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 6 months ago
Isomorphism of regular trees and words
The complexity of the isomorphism problem for regular trees, regular linear orders, and regular words is analyzed. A tree is regular if it is isomorphic to the prefix order on a r...
Markus Lohrey, Christian Mathissen
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 6 months ago
The existence of k-radius sequences
Simon R. Blackburn
CORR
2011
Springer
178views Education» more  CORR 2011»
13 years 6 months ago
Walking on a Graph with a Magnifying Glass
Maciej Kurant, Minas Gjoka, Carter T. Butts, Athin...
CORR
2011
Springer
170views Education» more  CORR 2011»
13 years 6 months ago
A Model for Coherent Distributed Memory For Race Condition Detection
—We present a new model for distributed shared memory systems, based on remote data accesses. Such features are offered by network interface cards that allow one-sided operations...
Franck Butelle, Camille Coti
CORR
2011
Springer
161views Education» more  CORR 2011»
13 years 6 months ago
On Parsimonious Explanations for 2-D Tree- and Linearly-Ordered Data
This paper studies the “explanation problem” for tree- and linearly-ordered array data, a problem motivated by database applications and recently solved for the one-dimensiona...
Howard J. Karloff, Flip Korn, Konstantin Makaryche...
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 7 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom