Sciweavers

1356 search results - page 258 / 272
» The ideal of verified software
Sort
View
CCS
2011
ACM
13 years 11 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
HIPEAC
2011
Springer
13 years 11 months ago
TypeCastor: demystify dynamic typing of JavaScript applications
Dynamic typing is a barrier for JavaScript applications to achieve high performance. Compared with statically typed languages, the major overhead of dynamic typing comes from runt...
Shisheng Li, Buqi Cheng, Xiao-Feng Li
CMC
1998
Springer
15 years 4 months ago
The IntelliMedia WorkBench - An Environment for Building Multimodal Systems
Abstract. Intelligent MultiMedia (IntelliMedia) focuses on the computer processing and understanding of signal and symbol input from at least speech, text and visual images in term...
Tom Brøndsted, Paul Dalsgaard, Lars Bo Lars...
BMCBI
2008
141views more  BMCBI 2008»
14 years 12 months ago
MiRTif: a support vector machine-based microRNA target interaction filter
Background: MicroRNAs (miRNAs) are a set of small non-coding RNAs serving as important negative gene regulators. In animals, miRNAs turn down protein translation by binding to the...
Yuchen Yang, Yu-Ping Wang, Kuo-Bin Li
DAC
2005
ACM
16 years 22 days ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...