Sciweavers

950 search results - page 29 / 190
» Constraint Based Resilience Analysis
Sort
View
ACSAC
2001
IEEE
14 years 12 days ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 8 months ago
Automatic Modular Abstractions for Template Numerical Constraints
c Modular Abstractions for Template Numerical Constraints David Monniaux May 26, 2010 We propose a method for automatically generating abstract transformstatic analysis by abstrac...
David Monniaux
PAKDD
2007
ACM
130views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Deriving Private Information from Arbitrarily Projected Data
Distance-preserving projection based perturbation has gained much attention in privacy-preserving data mining in recent years since it mitigates the privacy/accuracy tradeoff by ac...
Songtao Guo, Xintao Wu
RTAS
2009
IEEE
14 years 3 months ago
Proactive Speed Scheduling for Real-Time Tasks under Thermal Constraints
Thermal management becomes a prominent issue in system design for both server systems and embedded systems. A system could fail if the peak temperature exceeds its thermal constra...
Jian-Jia Chen, Shengquan Wang, Lothar Thiele
AISC
2006
Springer
14 years 15 days ago
Finding Relations Among Linear Constraints
In program analysis and verification, there are some constraints that have to be processed repeatedly. A possible way to speed up the processing is to find some relations among the...
Jun Yan, Jian Zhang, Zhongxing Xu