Sciweavers

3706 search results - page 368 / 742
» The Transformational Approach to Program Development
Sort
View
CSFW
2005
IEEE
15 years 9 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 6 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
CVPR
2008
IEEE
15 years 10 months ago
Fast kernel learning for spatial pyramid matching
Spatial pyramid matching (SPM) is a simple yet effective approach to compute similarity between images. Similarity kernels at different regions and scales are usually fused by som...
Junfeng He, Shih-Fu Chang, Lexing Xie
PADL
2007
Springer
15 years 10 months ago
Automatic Incrementalization of Prolog Based Static Analyses
Modern development environments integrate various static analyses into the build process. Analyses that analyze the whole project whenever the project changes are impractical in th...
Michael Eichberg, Matthias Kahl, Diptikalyan Saha,...
XSYM
2005
Springer
84views Database» more  XSYM 2005»
15 years 9 months ago
Patterns and Types for Querying XML Documents
Among various proposals for primitives for deconstructing XML data two approaches seem to clearly stem from practise: path expressions, widely adopted by the database community, an...
Giuseppe Castagna