Sciweavers

243 search results - page 16 / 49
» Exception-Based Information Flow Control in Object-Oriented ...
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 3 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
IJCV
2000
195views more  IJCV 2000»
14 years 9 months ago
Optical Flow Constraints on Deformable Models with Applications to Face Tracking
Optical flow provides a constraint on the motion of a deformable model. We derive and solve a dynamic system incorporating flow as a hard constraint, producing a model-based least...
Douglas DeCarlo, Dimitris N. Metaxas
BPM
2000
Springer
133views Business» more  BPM 2000»
15 years 1 months ago
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, ...
Wil M. P. van der Aalst
TCS
2010
14 years 7 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
ICS
1989
Tsinghua U.
15 years 1 months ago
Control flow optimization for supercomputer scalar processing
Control intensive scalar programs pose a very different challenge to highly pipelined supercomputers than vectorizable numeric applications. Function call/return and branch instru...
Pohua P. Chang, Wen-mei W. Hwu