Sciweavers

606 search results - page 16 / 122
» Library Miniaturization Using Static and Dynamic Information
Sort
View
ICSE
2012
IEEE-ACM
11 years 10 months ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
ICFP
2012
ACM
11 years 10 months ago
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may be leaked by terminating accordingly. While this termination covert channel has limited ...
Deian Stefan, Alejandro Russo, Pablo Buiras, Amit ...
CADE
2008
Springer
14 years 7 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
BSN
2009
IEEE
145views Sensor Networks» more  BSN 2009»
14 years 2 months ago
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 9 months ago
A Framework for Flexible Access Control in Digital Library Systems
Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not complete...
Indrajit Ray, Sudip Chakraborty