Sciweavers

800 search results - page 63 / 160
» XML access control using static analysis
Sort
View
120
Voted
SCAM
2008
IEEE
15 years 10 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
149
Voted
WSC
1997
15 years 4 months ago
Collision Awareness Multiple Access Networks Performance Optimization
Collision awareness (CA) multiple access networks include the carrier sense multiple access (CSMA), ALOHA, and Ethernet networks. In order to maximize throughput with minimum netw...
Paul T. R. Wang, Yoon K. Hong
151
Voted
DASIP
2010
14 years 10 months ago
Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation
This paper proposes an automatic design flow from userfriendly design to efficient implementation of video processing systems. This design flow starts with the use of coarsegrain ...
Ruirui Gu, Jonathan Piat, Mickaël Raulet, J&o...
135
Voted
IROS
2009
IEEE
195views Robotics» more  IROS 2009»
15 years 10 months ago
System design of an Insertable Robotic Effector Platform for Single Port Access (SPA) Surgery
—This paper presents a novel design and preliminary kinematic analysis of an Insertable Robotic Effector Platform (IREP) for Single Port Access (SPA) Surgery. The IREP robot can ...
Kai Xu 0005, Roger E. Goldman, Jienan Ding, Peter ...
131
Voted
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 10 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...