Sciweavers

1040 search results - page 69 / 208
» Resource Usage Verification
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
ASPDAC
2007
ACM
79views Hardware» more  ASPDAC 2007»
15 years 1 months ago
Challenges to Accuracy for the Design of Deep-Submicron RF-CMOS Circuits
- Two challenges for the accurate prediction of GHz CMOS analog/RF building blocks are presented. Challenging the usage of new compact MOSFET models enhances the simulation accurac...
S. Yoshitomi
TMM
2010
169views Management» more  TMM 2010»
14 years 4 months ago
An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
This paper introduces a video copy detection system which efficiently matches individual frames and then verifies their spatio-temporal consistency. The approach for matching frame...
Matthijs Douze, Herve Jegou, Cordelia Schmid
DBSEC
2010
126views Database» more  DBSEC 2010»
14 years 11 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
IJNSEC
2006
89views more  IJNSEC 2006»
14 years 9 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara