• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 527
Next 10 →

Understanding Code Mobility

by Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna - IEEE COMPUTER SCIENCE PRESS , 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract - Cited by 560 (34 self) - Add to MetaCart
implementation technologies. The presentation of the classification is intertwined with a review of the state of the art in the field. Finally, the use of the classification is exemplified in a case study.

Secure and selective dissemination of xml documents

by Elisa Bertino, Elena Ferrari - ACM Transactions on Information and System Security , 2002
"... XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus t ..."
Abstract - Cited by 121 (14 self) - Add to MetaCart
XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
reward mechanisms. The framework is based on the description of observable behavior and superficially resembles the behaviorist approach, although mental states 92 SCHULTZ of representation and prediction are essential. Dropping the issues of subjective feelings of pleasure will allow us to do objective

A Logic Programming Approach to Knowledge-State Planning, II: The DLV System

by Thomas Eiter, Wolfgang Faber, Nicola Leone, Gerald Pfeifer, Axel Polleres , 2001
"... In Part I of this series of papers, we have proposed a new logic-based planning language, called K. This language facilitates the description of transitions between states of knowledge and it is well suited for planning under incomplete knowledge. Nonetheless, K also supports the representation of t ..."
Abstract - Cited by 106 (34 self) - Add to MetaCart
of transitions between states of the world (i.e., states of complete knowledge) as a special case, proving to be very flexible. In the present Part II, we describe the DLV planning system, which implements K on top of the disjunctive logic programming system DLV. This novel planning system allows for solving

Stateful UML Design with Security Constraints for Information Assurance

by n.n.
"... The design of software applications using UML embodies an incremental process, transitioning a design from state to state over time. The integration of security, namely, role-based access control (RBAC) and mandatory access control (MAC), into this process is critical, dictated by the increasing nee ..."
Abstract - Add to MetaCart
.) and connections (e.g., inheritance, association, etc.) are added, modified, and deleted. As a result, the framework is able to capture and check snapshots of each design state containing security constraints and insures that information assurance with respect to the application’s security requirements is always

Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces

by Kaushik Chakrabarti, Sharad Mehrotra , 2000
"... Many emerging application domains require database systems to support efficient access over highly multidimensional datasets. The current state-of-the-art technique to indexing high dimensional data is to first reduce the dimensionality of the data using Principal Component Analysis and then in ..."
Abstract - Cited by 119 (2 self) - Add to MetaCart
Many emerging application domains require database systems to support efficient access over highly multidimensional datasets. The current state-of-the-art technique to indexing high dimensional data is to first reduce the dimensionality of the data using Principal Component Analysis

Emerging Radiation Hardness Assurance (RHA) Issues: A NASA Approach for Space Flight Programs

by Kenneth A Label , Allan H Johnston , Janet L Barth , Robert A Reed , Charles E Barnes , K A Label - IEEE Transactions on Nuclear Science , 1998
"... Abstract Spacecraft performance requirements drive the utilization of commercial-off-the-shelf (COTS) components and emerging technologies in systems. The response of these technologies to radiation is often complex. This engenders a set of emerging radiation hardness assurance (RHA) issues which i ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
Abstract Spacecraft performance requirements drive the utilization of commercial-off-the-shelf (COTS) components and emerging technologies in systems. The response of these technologies to radiation is often complex. This engenders a set of emerging radiation hardness assurance (RHA) issues which

State of the art

by unknown authors , 2011
"... Existing static graph models mainly follow two approaches. Random modelling consists in randomly sampling, with uniform probability, a graph among the set of those that have a given property, see for instance [2, 4, 8, 12, 17]. Other models take the form of an iterative construction process that eve ..."
Abstract - Add to MetaCart
Existing static graph models mainly follow two approaches. Random modelling consists in randomly sampling, with uniform probability, a graph among the set of those that have a given property, see for instance [2, 4, 8, 12, 17]. Other models take the form of an iterative construction process

Achieving Security Assurance with Assertion-based Application Construction

by Carlos E. Rubio-medrano, Gail-joon Ahn, Karsten Sohr
"... Abstract—Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application program-ming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal ..."
Abstract - Add to MetaCart
assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques. I.

1MULTI-DOMAIN SURETY MODELING AND ANALYSIS FOR HIGH ASSURANCE SYSTEMS

by James Davis, Jason Scott, Janos Sztipanovits, Marcus Martinez
"... Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design. ..."
Abstract - Add to MetaCart
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design
Next 10 →
Results 1 - 10 of 527
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University