Sciweavers

800 search results - page 128 / 160
» XML access control using static analysis
Sort
View
LCN
2005
IEEE
15 years 9 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
MSWIM
2005
ACM
15 years 8 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø
CVPR
2007
IEEE
16 years 5 months ago
3D Occlusion Inference from Silhouette Cues
We consider the problem of detecting and accounting for the presence of occluders in a 3D scene based on silhouette cues in video streams obtained from multiple, calibrated views....
Jean-Sébastien Franco, Li Guan, Marc Pollef...
SIGSOFT
2007
ACM
16 years 4 months ago
The impact of input domain reduction on search-based test data generation
There has recently been a great deal of interest in search? based test data generation, with many local and global search algorithms being proposed. However, to date, there has be...
Mark Harman, Youssef Hassoun, Kiran Lakhotia, Phil...
COMPSAC
2009
IEEE
15 years 10 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...