Sciweavers

199 search results - page 22 / 40
» Bad Variables Under Control
Sort
View
CCS
2009
ACM
15 years 4 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
PSD
2010
Springer
131views Database» more  PSD 2010»
14 years 8 months ago
Data Swapping for Protecting Census Tables
The pre-tabular statistical disclosure control (SDC) method of data swapping is the preferred method for protecting Census tabular data in some National Statistical Institutes, in...
Natalie Shlomo, Caroline Tudor, Paul Groom
ISSTA
2000
ACM
15 years 2 months ago
Requirements-based monitors for real-time systems
—Before designing safety- or mission-critical real-time systems, a specification of the required behavior of the system should be produced and reviewed by domain experts. After ...
Dennis K. Peters, David Lorge Parnas
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
15 years 6 months ago
Performance-oriented statistical parameter reduction of parameterized systems via reduced rank regression
Process variations in modern VLSI technologies are growing in both magnitude and dimensionality. To assess performance variability, complex simulation and performance models param...
Zhuo Feng, Peng Li
DMIN
2006
124views Data Mining» more  DMIN 2006»
14 years 11 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea