Sciweavers

2043 search results - page 285 / 409
» Reasoning About Security Models
Sort
View
DOCENG
2004
ACM
15 years 6 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
119
Voted
JWSR
2008
98views more  JWSR 2008»
15 years 22 days ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
108
Voted
JLP
2010
85views more  JLP 2010»
14 years 7 months ago
Synchronous Kleene algebra
The work presented here investigates the combination of Kleene algebra with the synchrony model of concurrency from Milner's SCCS calculus. The resulting algebraic structure ...
Cristian Prisacariu
97
Voted
CVPR
2005
IEEE
16 years 2 months ago
Tracking Multiple Objects through Occlusions
We present an approach for tracking varying number of objects through both temporally and spatially significant occlusions. Our method builds on the idea of object permanence to r...
Yan Huang, Irfan A. Essa
90
Voted
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 1 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur