Sciweavers

2065 search results - page 395 / 413
» User interface for multi-agent systems: A case study
Sort
View
AOSD
2009
ACM
15 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
80
Voted
MIR
2004
ACM
113views Multimedia» more  MIR 2004»
15 years 3 months ago
Texture based medical image indexing and retrieval: application to cardiac imaging
Although digital images indexing and querying techniques have extensively been studied for the last years, few systems are dedicated to medical images today while the need for con...
Tristan Glatard, Johan Montagnat, Isabelle E. Magn...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
AI
2007
Springer
14 years 10 months ago
Conservation principles and action schemes in the synthesis of geometric concepts
In this paper a theory for the synthesis of geometric concepts is presented. The theory is focused on a constructive process that synthesizes a function in the geometric domain re...
Luis Alberto Pineda
TSE
2010
125views more  TSE 2010»
14 years 8 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin