Sciweavers

165 search results - page 2 / 33
» Constraints: The Ties that Bind
Sort
View
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
13 years 11 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
BVAI
2007
Springer
13 years 9 months ago
Different Binding Strategies for the Different Stages of Visual Recognition
Many think attention needs an executive to allocate resources. Although the cortex exhibits substantial plasticity, dynamic allocation of neurons seems outside its capability. Supp...
John K. Tsotsos, Antonio Jose Rodríguez-S&a...
WWW
2006
ACM
14 years 6 months ago
One document to bind them: combining XML, web services, and the semantic web
We present a paradigm for uniting the diverse strands of XML-based Web technologies by allowing them to be incorporated within a single document. This overcomes the distinction be...
Harry Halpin, Henry S. Thompson
ADAEUROPE
1998
Springer
13 years 9 months ago
Automating the Ada Binding Process for Java- How Far Can We Go?
This paper describes an automated approach for generating Ada bindings from Java class files. We start with the set of Java features that require a visible Ada binding, and an Ada ...
David E. Emery, Robert F. Mathias, Karl A. Nyberg
OTM
2010
Springer
13 years 3 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling