Sciweavers

2486 search results - page 56 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
PSIVT
2009
Springer
252views Multimedia» more  PSIVT 2009»
14 years 1 months ago
Moving Object Segmentation Using Optical Flow and Depth Information
This paper discusses the detection of moving objects (being a crucial part of driver assistance systems) using monocular or stereoscopic computer vision. In both cases, object dete...
Jens Klappstein, Tobi Vaudrey, Clemens Rabe, Andre...
ICNP
2005
IEEE
14 years 2 months ago
Typed Abstraction of Complex Network Compositions
straction of Complex Network Compositions∗ Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, and Ibrahim Matta Department of Computer Science Boston University The heterogeneity...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
CCS
2006
ACM
14 years 14 days ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
IFIP
2010
Springer
13 years 3 months ago
Modular Plans for Secure Service Composition
Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from ...
Gabriele Costa, Pierpaolo Degano, Fabio Martinelli
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
14 years 2 months ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith