Sciweavers

319 search results - page 48 / 64
» Dynamically inferring temporal properties
Sort
View
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 1 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
FM
2003
Springer
108views Formal Methods» more  FM 2003»
14 years 26 days ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002
ECOOP
2010
Springer
14 years 13 days ago
Recency Types for Analyzing Scripting Languages
Abstract. With the current surge of scripting technologies, large programs are being built with dynamically typed languages. As these programs grow in size, semantics-based tools g...
Phillip Heidegger, Peter Thiemann
COMSNETS
2012
168views more  COMSNETS 2012»
12 years 3 months ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...
CVPR
2009
IEEE
15 years 2 months ago
Joint Depth and Alpha Matte Optimization via Fusion of Stereo and Time-of-Flight Sensor
We present a new approach to iteratively estimate both high-quality depth map and alpha matte from a single image or a video sequence. Scene depth, which is invariant to illumin...
Jiejie Zhu (University of Kentucky), Miao Liao (Un...