Sciweavers

330 search results - page 57 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
ICFP
2009
ACM
16 years 10 days ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 5 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
RULEML
2004
Springer
15 years 5 months ago
A Defeasible Logic Reasoner for the Semantic Web
Abstract. Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is, among others, useful for ontology i...
Nick Bassiliades, Grigoris Antoniou, Ioannis P. Vl...
ICDCS
1996
IEEE
15 years 3 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
CVPR
1997
IEEE
15 years 3 months ago
Name-It: Association of Face and Name in Video
This paper proposes a novel approach to extract meaningful content information from video by collaborative integration of imageunderstanding and natural language processing. As an...
Shin'ichi Satoh, Takeo Kanade