Sciweavers

800 search results - page 110 / 160
» XML access control using static analysis
Sort
View
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
TKDE
2010
184views more  TKDE 2010»
15 years 1 months ago
The Dynamic Bloom Filters
—A Bloom filter is an effective, space-efficient data structure for concisely representing a set, and supporting approximate membership queries. Traditionally, the Bloom filter a...
Deke Guo, Jie Wu, Honghui Chen, Ye Yuan, Xueshan L...
138
Voted
CBSE
2005
Springer
15 years 9 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
ICIP
2007
IEEE
15 years 9 months ago
Face Recognition using a Fast Model Synthesis from a Profile and a Frontal View
In our previous work we presented a new 2D-3D mixed face recognition scheme called Partial Principal Component Analysis (P2 CA) [1]. The main contribution of P2 CA is that it uses...
Antonio Rama, Francesc Tarres
MMMACNS
2001
Springer
15 years 7 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato