Sciweavers

1809 search results - page 233 / 362
» Software Model Checking Using Linear Constraints
Sort
View
109
Voted
SACMAT
2010
ACM
15 years 7 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
ICSE
2005
IEEE-ACM
16 years 2 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
108
Voted
ICIP
2006
IEEE
16 years 3 months ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
LCPC
2007
Springer
15 years 8 months ago
An Experimental Evaluation of the New OpenMP Tasking Model
The OpenMP standard was conceived to parallelize dense array-based applications, and it has achieved much success with that. Recently, a novel tasking proposal to handle unstructur...
Eduard Ayguadé, Alejandro Duran, Jay Hoefli...
MKWI
2008
112views Business» more  MKWI 2008»
15 years 3 months ago
An Environment for the Orthographic Modeling of Workflow Components
: An important goal of workflow engines is to simplify the way in which the interaction of workflows and software components (or services) is described and implemented. The vision ...
Colin Atkinson, Dietmar Stoll