Sciweavers

1096 search results - page 175 / 220
» Computation Slicing: Techniques and Theory
Sort
View
POPL
2005
ACM
14 years 9 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
SIGCOMM
2009
ACM
14 years 3 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
TPHOL
2008
IEEE
14 years 3 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
14 years 3 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
DAGM
2001
Springer
14 years 1 months ago
Optimal Camera Parameter Selection for State Estimation with Applications in Object Recognition
In this paper we introduce a formalism for optimal camera parameter selection for iterative state estimation. We consider a framework based on Shannon’s information theory and se...
Joachim Denzler, Christopher M. Brown, Heinrich Ni...