Sciweavers

2272 search results - page 337 / 455
» Capture Complexity by Partition
Sort
View
CCS
2003
ACM
15 years 8 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CHARME
2003
Springer
196views Hardware» more  CHARME 2003»
15 years 8 months ago
Analyzing the Intel Itanium Memory Ordering Rules Using Logic Programming and SAT
We present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constra...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom, K...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
15 years 8 months ago
Multicriteria Network Design Using Evolutionary Algorithm
In this paper, we revisit a general class of multi-criteria multi-constrained network design problems and attempt to solve, in a novel way, with Evolutionary Algorithms (EAs). A ma...
Rajeev Kumar, Nilanjan Banerjee
ECCV
2010
Springer
15 years 8 months ago
Stacked Hierarchical Labeling
In this work we propose a hierarchical approach for labeling semantic objects and regions in scenes. Our approach is reminiscent of early vision literature in that we use a decompo...
COMPSAC
2002
IEEE
15 years 8 months ago
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’...
James Joshi, Elisa Bertino, Arif Ghafoor