Sciweavers

1980 search results - page 255 / 396
» On the Associative Nijenhuis Relation
Sort
View
106
Voted
ICALP
2005
Springer
15 years 6 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
144
Voted
ISRR
2005
Springer
201views Robotics» more  ISRR 2005»
15 years 6 months ago
Advances in High Resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by the mismatch between available navigation as compared to sensor accuracy. In this paper we present ...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
OOPSLA
2005
Springer
15 years 6 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
82
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Exploring the acceptability envelope
An acceptability envelope is a region of imperfect but acceptable software systems surrounding a given perfect system. Explicitly targeting the acceptability envelope during devel...
Martin C. Rinard, Cristian Cadar, Huu Hai Nguyen
VIZSEC
2005
Springer
15 years 6 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...