Sciweavers

107 search results - page 9 / 22
» Controlling Redundancy in Referring Expressions
Sort
View
FM
2009
Springer
104views Formal Methods» more  FM 2009»
14 years 1 months ago
Verifying Information Flow Control over Unbounded Processes
Abstract. Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that re...
William R. Harris, Nicholas Kidd, Sagar Chaki, Som...
ACSAC
2005
IEEE
14 years 29 days ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
ECEASST
2008
106views more  ECEASST 2008»
13 years 7 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
ACL
1997
13 years 8 months ago
An Algorithm for Generating Referential Descriptions with Flexible Interfaces
Most algorithms dedicated to the generation of referential descriptions widely suffer from a fundamental problem: they make too strong assumptions about adjacent processing compon...
Helmut Horacek
ECOOPW
1999
Springer
13 years 11 months ago
Flexible Aliasing with Protection
Unwanted effects of aliasing cause encapsulation problems in object oriented programming. Nevertheless, aliasing is part of common and efficient programming techniques for expres...
Günter Kniesel, Dirk Theisen