Sciweavers

1363 search results - page 74 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
115
Voted
STOC
2001
ACM
123views Algorithms» more  STOC 2001»
16 years 3 months ago
On optimal slicing of parallel programs
Optimal program slicing determines for a statement S in a program whether or not S affects a specified set of statements, given that all conditionals in are interpreted as non-d...
Markus Müller-Olm, Helmut Seidl
109
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng
ICES
2010
Springer
160views Hardware» more  ICES 2010»
15 years 1 months ago
Fault Tolerance of Embryonic Algorithms in Mobile Networks
In previous work the authors have described an approach for building distributed self
David Lowe, Amir Mujkanovic, Daniele Miorandi, Lid...
COLCOM
2009
IEEE
15 years 8 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu
115
Voted
ICA
2007
Springer
15 years 7 months ago
Underdetermined Source Separation Using Mixtures of Warped Laplacians
In a previous work, the authors have introduced a Mixture of Laplacians model in order to cluster the observed data into the sound sources that exist in an underdetermined two-sens...
Nikolaos Mitianoudis, Tania Stathaki