Sciweavers

50 search results - page 6 / 10
» Expressing Security Properties Using Selective Interleaving ...
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
GLOBECOM
2008
IEEE
15 years 4 months ago
Numerical Performance Evaluation of OFDM Systems Affected by Transmitter Nonlinearities, Phase Noise and Channel Estimation Erro
Abstract—In this contribution we present a numerical approach to evaluate the bit error rate and mutual information of OFDM links affected by transmitter nonlinearities, phase no...
Steffen Bittner, Marco Krondorf, Gerhard Fettweis
ESOP
2009
Springer
15 years 4 months ago
Amortised Memory Analysis Using the Depth of Data Structures
Hofmann and Jost have presented a heap space analysis [1] that finds linear space bounds for many functional programs. It uses an amortised analysis: assigning hypothetical amount...
Brian Campbell
SIGSOFT
2003
ACM
15 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
IEEESCC
2009
IEEE
15 years 4 months ago
Web Service Substitution Based on Preferences Over Non-functional Attributes
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar