Sciweavers

647 search results - page 77 / 130
» Regular Symmetry Patterns
Sort
View
108
Voted
EUROSYS
2007
ACM
16 years 23 days ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
117
Voted
AIMS
2007
Springer
15 years 10 months ago
Improving Anomaly Detection Event Analysis Using the EventRank Algorithm
Abstract. We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is ...
Kyrre M. Begnum, Mark Burgess
116
Voted
FMCAD
2007
Springer
15 years 10 months ago
Induction in CEGAR for Detecting Counterexamples
— Induction has been studied in model checking for proving the validity of safety properties, i.e., showing the absence of counterexamples. To our knowledge, induction has not be...
Chao Wang, Aarti Gupta, Franjo Ivancic
135
Voted
IWCM
2004
Springer
15 years 9 months ago
Divide-and-Conquer Strategies for Estimating Multiple Transparent Motions
Abstract. Motion estimation is essential in a variety of image processing and computer vision tasks, like video coding, tracking, directional filtering and denoising, scene analys...
Cicero Mota, Ingo Stuke, Til Aach, Erhardt Barth
163
Voted
CSMR
1998
IEEE
15 years 8 months ago
Assessing Architectural Complexity
While it is widely agreed that architectural simplicity is a key factor to the success of large software systems, it is not obvious how to measure architectural complexity. Our ap...
Rick Kazman, M. Burth