Sciweavers

16843 search results - page 3306 / 3369
» On Generalized Authorization Problems
Sort
View
89
Voted
JOT
2008
153views more  JOT 2008»
15 years 19 days ago
I Resign: Resigning Jar Files with Initium
This paper describes how to resign Jar files. Jar files (Java archives) are used by technologies (like Java Web Start) to deploy applications that are run with increased privilege...
Douglas Lyon
DAM
2007
107views more  DAM 2007»
15 years 19 days ago
Eliminating graphs by means of parallel knock-out schemes
In 1997 Lampert and Slater introduced parallel knock-out schemes, an iterative process on graphs that goes through several rounds. In each round of this process, every vertex elim...
Hajo Broersma, Fedor V. Fomin, Rastislav Kralovic,...
110
Voted
JCP
2006
90views more  JCP 2006»
15 years 19 days ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
97
Voted
JFP
2006
78views more  JFP 2006»
15 years 18 days ago
Sound and complete models of contracts
Even in statically typed languages it is useful to have certain invariants checked dynamically. Findler and Felleisen gave an algorithm for dynamically checking expressive highero...
Matthias Blume, David A. McAllester
86
Voted
ECCC
2007
86views more  ECCC 2007»
15 years 18 days ago
Testing Halfspaces
This paper addresses the problem of testing whether a Boolean-valued function f is a halfspace, i.e. a function of the form f(x) = sgn(w·x−θ). We consider halfspaces over the ...
Kevin Matulef, Ryan O'Donnell, Ronitt Rubinfeld, R...
« Prev « First page 3306 / 3369 Last » Next »