Sciweavers

241 search results - page 31 / 49
» Lattices and Spherical Designs
Sort
View
86
Voted
CSFW
2006
IEEE
15 years 8 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
100
Voted
TCS
2010
15 years 8 days ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
148
Voted
AOSD
2009
ACM
14 years 11 months ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook
IFIP
2005
Springer
15 years 7 months ago
Relative Trustworthiness
We present a method for trust scenarios with more than one trustee, where sets of trustees are ordered in a relation of relative trustworthiness. We show how a priority structure i...
Johan W. Klüwer, Arild Waaler
ISTCS
1993
Springer
15 years 6 months ago
Subpixel Image Registration Using Circular Fiducials
The design of fiducials for precise image registration is of major practical importance in computer vision, especially in automatic inspection applications. We analyze the subpix...
Alon Efrat, Craig Gotsman