What You Lose is What You Leak: Information Leakage in Declassification Policies Fulltext Access 20 Pages 2007
The maximum agreement forest problem: Approximation algorithms and computational experiments Fulltext Access 20 Pages 2007
A Methodological Approach to Choose Components in Development and Evolution Processes Fulltext Access 20 Pages 2007
Impact of Evolution of Concerns in the Model-Driven Architecture Design Approach Fulltext Access 20 Pages 2007
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags 1 Fulltext Access 20 Pages 2007
Functional Programming With Higher-order Abstract Syntax and Explicit Substitutions Fulltext Access 20 Pages 2007
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting 1 Fulltext Access 20 Pages 2007
Classification of the Computable Approximations by Divergence Boundings 1 Fulltext Access 20 Pages 2007
An automated entity–relationship clustering algorithm for conceptual database design Fulltext Access 20 Pages 2007
Using differential evolution to improve the accuracy of bank rating systems Fulltext Access 20 Pages 2007
Holistic analysis of asynchronous real-time transactions with earliest deadline scheduling Fulltext Access 21 Pages 2007
Reasoning about interaction protocols for customizing web service selection and composition Fulltext Access 21 Pages 2007
Hardness and approximation results for Black Hole Search in arbitrary networks Fulltext Access 21 Pages 2007
Polynomial approximations of the relational semantics of imperative programs Fulltext Access 21 Pages 2007
A comparison of simulated annealing with a simple evolutionary algorithm on pseudo-boolean functions of unitation Fulltext Access 21 Pages 2007
Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication Fulltext Access 21 Pages 2007
Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption 1 Fulltext Access 21 Pages 2007
A bootstrap approach to test the conditional symmetry in time series models Fulltext Access 21 Pages 2007
A comparative study of the reliability of nine statistical software packages Fulltext Access 21 Pages 2007
Indexing schemes for similarity search in datasets of short protein fragments Fulltext Access 21 Pages 2007
Data space mapping for efficient I/O in large multi-dimensional databases Fulltext Access 21 Pages 2007
Random constraint satisfaction: Easy generation of hard (satisfiable) instances Fulltext Access 21 Pages 2007
Fault tolerant high performance Information Services for dynamic collections of Grid and Web services Fulltext Access 21 Pages 2007
Transformation for Refining Unraveled Conditional Term Rewriting Systems Fulltext Access 21 Pages 2007
Timed Concurrent Constraint Programming for Analysing Biological Systems Fulltext Access 21 Pages 2007