Sciweavers

1226 search results - page 43 / 246
» Generating Abstractions from Static Domain Analysis
Sort
View
ICTCS
2005
Springer
15 years 6 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
110
Voted
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
15 years 6 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
100
Voted
JEI
2008
129views more  JEI 2008»
14 years 11 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
103
Voted
AMAST
2008
Springer
15 years 2 months ago
Long-Run Cost Analysis by Approximation of Linear Operators over Dioids
Abstract. We present a static analysis technique for modeling and approximating the long-run resource usage of programs. The approach is based on a quantitative semantic framework ...
David Cachera, Thomas P. Jensen, Arnaud Jobin, Pas...
95
Voted
IVC
2008
101views more  IVC 2008»
15 years 16 days ago
Occlusion analysis: Learning and utilising depth maps in object tracking
Complex scenes such as underground stations and malls are composed of static occlusion structures such as walls, entrances, columns, turnstiles and barriers. Unless this occlusion...
Darrel Greenhill, John-Paul Renno, James Orwell, G...