Sciweavers

516 search results - page 10 / 104
» Getting the Details Right
Sort
View
NDSS
2003
IEEE
14 years 26 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
EMISAIJ
2010
13 years 2 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
ACSC
2006
IEEE
14 years 1 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
AMC
2007
112views more  AMC 2007»
13 years 7 months ago
A ternary 4-point approximating subdivision scheme
In the implementation of subdivision scheme, three of the most important issues are smoothness, size of support, and approximation order. Our objective is to introduce an improved...
Kwan Pyo Ko, Byung-Gook Lee, Gang Joon Yoon
COLING
2000
13 years 9 months ago
Backward Beam Search Algorithm for Dependency Analysis of Japanese
Backward beam search for dependency analysis of Japanese is proposed. As dependencies normally go from left to right in Japanese, it is effective to analyze sentences backwards (f...
Satoshi Sekine, Kiyotaka Uchimoto, Hitoshi Isahara