Sciweavers

168 search results - page 32 / 34
» A Generalization of Hybrid Let-Polymorphic Type Inference Al...
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
DAC
2010
ACM
13 years 10 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
IAT
2007
IEEE
14 years 1 months ago
Revisiting ADOPT-ing and its Feedback Schemes
Here we revisit ADOPT-ing and bring two new contributions. One contribution consists of developing variations on the algorithms keeping the improvement in length of chain of causa...
Marius-Calin Silaghi, Makoto Yokoo
MM
2003
ACM
118views Multimedia» more  MM 2003»
14 years 22 days ago
Generation of interactive multi-level video summaries
In this paper, we describe how a detail-on-demand representation for interactive video is used in video summarization. Our approach automatically generates a hypervideo composed o...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...
MOBISYS
2009
ACM
14 years 8 months ago
SoundSense: scalable sound sensing for people-centric applications on mobile phones
Top end mobile phones include a number of specialized (e.g., accelerometer, compass, GPS) and general purpose sensors (e.g., microphone, camera) that enable new people-centric sen...
Hong Lu, Wei Pan, Nicholas D. Lane, Tanzeem Choudh...