Sciweavers

800 search results - page 42 / 160
» XML access control using static analysis
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
108
Voted
DOCENG
2009
ACM
15 years 10 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
128
Voted
DEXA
2006
Springer
160views Database» more  DEXA 2006»
15 years 7 months ago
Clustering of Search Engine Keywords Using Access Logs
Abstract. It the becomes possible that users can get kinds of information by just inputting search keyword(s) representing the topic which users are interested in. But it is not al...
Shingo Otsuka, Masaru Kitsuregawa
120
Voted
ATVA
2009
Springer
137views Hardware» more  ATVA 2009»
15 years 10 months ago
State Space Reduction of Linear Processes Using Control Flow Reconstruction
Abstract. We present a new method for fighting the state space explosion of process algebraic specifications, by performing static analysis on an intermediate format: linear proc...
Jaco van de Pol, Mark Timmer
126
Voted
ICLP
2007
Springer
15 years 7 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...