Sciweavers

566 search results - page 78 / 114
» Array Abstractions from Proofs
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
EUROPAR
2005
Springer
14 years 1 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf
ISI
2005
Springer
14 years 1 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
CLEAR
2006
Springer
116views Biometrics» more  CLEAR 2006»
13 years 11 months ago
Multi-and Single View Multiperson Tracking for Smart Room Environments
Abstract. Simultaneous tracking of multiple persons in real world environments is an active research field and several approaches have been proposed, based on a variety of features...
Keni Bernardin, Tobias Gehrig, Rainer Stiefelhagen
JOBIM
2000
13 years 11 months ago
Can We Have Confidence in a Tree Representation?
Abstract. A tree representation distance method, applied to any dissimilarity array, always gives a valued tree, even if the tree model is not appropriate. In the first part, we pr...
Alain Guénoche, Henri Garreta