Sciweavers

3305 search results - page 153 / 661
» Can we Rely on SQL
Sort
View
CSFW
2004
IEEE
14 years 2 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
ESANN
2006
13 years 11 months ago
Degeneracy in model selection for SVMs with radial Gaussian kernel
We consider the model selection problem for support vector machines applied to binary classification. As the data generating process is unknown, we have to rely on heuristics as mo...
Tobias Glasmachers
AAECC
2008
Springer
63views Algorithms» more  AAECC 2008»
13 years 10 months ago
Probabilistic algorithms for computing resolvent representations of regular differential ideals
In a previous article [14], we proved the existence of resolvent representations for regular differential ideals. The present paper provides practical algorithms for computing suc...
Thomas Cluzeau, Evelyne Hubert
IANDC
2006
117views more  IANDC 2006»
13 years 10 months ago
Statistical probabilistic model checking with a focus on time-bounded properties
Probabilistic verification of continuous-time stochastic processes has received increasing attention in the model-checking community in the past five years, with a clear focus on ...
Håkan L. S. Younes, Reid G. Simmons
IVC
2008
142views more  IVC 2008»
13 years 10 months ago
3D-spline reconstruction using shape from shading: Spline from shading
In this work, we propose an original method of resolution of the shape from shading problem, which is accurate and converges with a few iterations. It relies on two simple ideas. ...
Frédéric Courteille, Alain Crouzil, ...