Sciweavers

1058 search results - page 55 / 212
» It's Doomed; We Can Prove It
Sort
View
CSFW
2004
IEEE
14 years 1 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
APAL
2008
102views more  APAL 2008»
13 years 10 months ago
Partial automorphism semigroups
Abstract. We study the relationship between algebraic structures and their inverse semigroups of partial automorphisms. We consider a variety of classes of natural structures inclu...
Jennifer Chubb, Valentina S. Harizanov, Andrei S. ...
MA
2010
Springer
122views Communications» more  MA 2010»
13 years 8 months ago
Thresholding methods to estimate copula density
Abstract: This paper deals with the problem of multivariate copula density estimation. Using wavelet methods we provide two shrinkage procedures based on thresholding rules for whi...
F. Autin, E. Le Pennec, K. Tribouley
ALT
2008
Springer
14 years 6 months ago
Active Learning in Multi-armed Bandits
In this paper we consider the problem of actively learning the mean values of distributions associated with a finite number of options (arms). The algorithms can select which opti...
András Antos, Varun Grover, Csaba Szepesv&a...
APPROX
2009
Springer
149views Algorithms» more  APPROX 2009»
14 years 4 months ago
On the Complexity of the Asymmetric VPN Problem
We give the first constant factor approximation algorithm for the asymmetric Virtual Private Network (Vpn) problem with arbitrary concave costs. We even show the stronger result, ...
Thomas Rothvoß, Laura Sanità