Sciweavers

739 search results - page 129 / 148
» Information Flow in Credential Systems
Sort
View
TOCS
2002
70views more  TOCS 2002»
13 years 7 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
DLS
2009
196views Languages» more  DLS 2009»
13 years 5 months ago
Contracts for first-class modules
Behavioral software contracts express properties concerning the flow of values across component (modules, classes, etc) interfaces. These properties are often beyond the reach of ...
T. Stephen Strickland, Matthias Felleisen
ICASSP
2011
IEEE
12 years 11 months ago
Motion-decision based spatiotemporal saliency for video sequences
An adaptive spatiotemporal saliency algorithm for video attention detection using motion vector decision is proposed, motivated by the importance of motion information in video se...
Yaping Zhu, Natan Jacobson, Hong Pan, Truong Q. Ng...
ICIP
2004
IEEE
14 years 9 months ago
A motion field reconstruction scheme for smooth boundary video object segmentation
Motion segmentation is a classic and on-going research topic which is an important pre-stage for many video processes. The reliability of the motion field calculation directly dete...
Jean Gao, Ninad Thakoor, Sungyong Jung
SIGSOFT
2004
ACM
14 years 8 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...