Sciweavers

3954 search results - page 30 / 791
» Image-based Model Completion
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 8 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
IPL
2010
79views more  IPL 2010»
15 years 2 months ago
Unrestricted and complete Breadth-First Search of trapezoid graphs in O(n) time
We present an O(n) Breadth-First Search algorithm for trapezoid graphs, which takes as input a trapezoid model and any priority order on the vertices. Our algorithm is the first ...
Christophe Crespelle, Philippe Gambette