Sciweavers

950 search results - page 29 / 190
» Constraint Based Resilience Analysis
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
CORR
2010
Springer
173views Education» more  CORR 2010»
14 years 9 months ago
Automatic Modular Abstractions for Template Numerical Constraints
c Modular Abstractions for Template Numerical Constraints David Monniaux May 26, 2010 We propose a method for automatically generating abstract transformstatic analysis by abstrac...
David Monniaux
PAKDD
2007
ACM
130views Data Mining» more  PAKDD 2007»
15 years 3 months ago
Deriving Private Information from Arbitrarily Projected Data
Distance-preserving projection based perturbation has gained much attention in privacy-preserving data mining in recent years since it mitigates the privacy/accuracy tradeoff by ac...
Songtao Guo, Xintao Wu
RTAS
2009
IEEE
15 years 4 months ago
Proactive Speed Scheduling for Real-Time Tasks under Thermal Constraints
Thermal management becomes a prominent issue in system design for both server systems and embedded systems. A system could fail if the peak temperature exceeds its thermal constra...
Jian-Jia Chen, Shengquan Wang, Lothar Thiele
AISC
2006
Springer
15 years 1 months ago
Finding Relations Among Linear Constraints
In program analysis and verification, there are some constraints that have to be processed repeatedly. A possible way to speed up the processing is to find some relations among the...
Jun Yan, Jian Zhang, Zhongxing Xu