Sciweavers

4281 search results - page 661 / 857
» How to Disembed a Program
Sort
View
112
Voted
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 9 months ago
A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis
Abstract. We present a new domain for analyzing must-equalities between address expressions. The domain is a smooth combination of Herbrand and affine equalities which enables us t...
Helmut Seidl, Vesal Vojdani, Varmo Vene
127
Voted
ICMT
2009
Springer
15 years 9 months ago
Model Superimposition in Software Product Lines
In software product line engineering, feature composition generates software tailored to specific requirements from a common set of artifacts. Superimposition is a technique to me...
Sven Apel, Florian Janda, Salvador Trujillo, Chris...
117
Voted
IFIP
2009
Springer
15 years 9 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér
103
Voted
IFIP
2009
Springer
15 years 9 months ago
Quantifying the Uncertainty in Measurements for MBAC
Abstract. In Measurement Based Admission Control (MBAC), the decision of accepting or rejecting a new flow is based on measurements of the current traffic situation. An in-depth u...
Anne Nevin, Peder J. Emstad, Yuming Jiang, Guoqian...
153
Voted
MOBISEC
2009
Springer
15 years 9 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan