Sciweavers

2609 search results - page 130 / 522
» Models for Global Constraint Applications
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 10 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
COLCOM
2008
IEEE
15 years 10 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
DATE
2006
IEEE
108views Hardware» more  DATE 2006»
15 years 10 months ago
Scheduling under resource constraints using dis-equations
Scheduling is an important step in high-level synthesis (HLS). In our tool, we perform scheduling in two steps: coarse-grain scheduling, in which we take into account the whole co...
Hadda Cherroun, Alain Darte, Paul Feautrier
IJCIS
1998
78views more  IJCIS 1998»
15 years 3 months ago
Merging Databases Under Constraints
The problem of integrating information from con icting sources comes up in many current applications, such as cooperative information systems, heterogeneous databases, and multi-a...
Jinxin Lin, Alberto O. Mendelzon
ICSE
2012
IEEE-ACM
13 years 6 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang