Sciweavers

3544 search results - page 615 / 709
» Information Security in Open Systems
Sort
View
82
Voted
NPAR
2010
ACM
15 years 4 months ago
Stylized depiction of images based on depth perception
Recent works in image editing are opening up new possibilities to manipulate and enhance input images. Within this context, we leverage well-known characteristics of human percept...
Jorge Lopez-Moreno, Jorge Jimenez, Sunil Hadap, Er...
PCI
2001
Springer
15 years 3 months ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
PLDI
2000
ACM
15 years 3 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
SAC
1998
ACM
15 years 3 months ago
Evaluating HyperDisco as an infrastructure for digital libraries
This paper describes a hypermedia infrastructure, called HyperDisco, designed to address important issues such as integration, collaboration, versioning, scalability, openness, di...
Uffe Kock Wiil
ASM
2010
ASM
15 years 2 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo