Sciweavers

723 search results - page 19 / 145
» Exclusion for composite objects
Sort
View
ASWEC
2005
IEEE
14 years 3 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
13 years 9 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel
OOPSLA
1999
Springer
14 years 2 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
GLVLSI
2005
IEEE
205views VLSI» more  GLVLSI 2005»
14 years 3 months ago
Optimization objectives and models of variation for statistical gate sizing
This paper approaches statistical optimization by examining gate delay variation models and optimization objectives. Most previous work on statistical optimization has focused exc...
Matthew R. Guthaus, Natesan Venkateswaran, Vladimi...
ICIW
2009
IEEE
13 years 7 months ago
Constraint Integration and Violation Handling for BPEL Processes
Autonomic, i.e. dynamic and fault-tolerant Web service composition is a requirement resulting from recent developments such as on-demand services. In the context of planning-based...
MingXue Wang, Kosala Yapa Bandara, Claus Pahl