Sciweavers

2911 search results - page 409 / 583
» A Logic of Graph Constraints
Sort
View
ICLP
2007
Springer
15 years 7 months ago
Static Region Analysis for Mercury
Abstract. Region-based memory management is a form of compiletime memory management, well-known from the functional programming world. This paper describes a static region analysis...
Quan Phan, Gerda Janssens
138
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
104
Voted
APN
2004
Springer
15 years 6 months ago
Reachability Set Generation for Petri Nets: Can Brute Force Be Smart?
Generating the reachability set is one of the most commonly required step when analyzing the logical or stochastic behavior of a system modeled with Petri nets. Traditional “expl...
Gianfranco Ciardo
99
Voted
ESORICS
2004
Springer
15 years 6 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan
96
Voted
ICDAR
2003
IEEE
15 years 6 months ago
Detection, Extraction and Representation of Tables
We are concerned with the extraction of tables from exchange format representations of very diverse composite documents. We put forward a flexible representation scheme for comple...
Jean-Yves Ramel, Michel Crucianu, Nicole Vincent, ...