Sciweavers

2609 search results - page 45 / 522
» Models for Global Constraint Applications
Sort
View
153
Voted
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
141
Voted
ICCV
2001
IEEE
16 years 5 months ago
Incorporating Differential Constraints in a 3D Reconstruction Process. Application to Stereo
We propose to incorporate a priori geometric constraints in a 3?D stereo reconstruction scheme to cope with the many cases where image information alone is not sufficient to accur...
Richard Lengagne, Pascal Fua
111
Voted
CCS
2010
ACM
15 years 6 months ago
Apex: extending Android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giv...
Mohammad Nauman, Sohail Khan, Xinwen Zhang
HPDC
2010
IEEE
15 years 4 months ago
Resource provisioning with budget constraints for adaptive applications in cloud environments
The recent emergence of clouds is making the vision of utility computing realizable, i.e. computing resources and services can be delivered, utilized, and paid for as utilities su...
Qian Zhu, Gagan Agrawal
ICLP
2003
Springer
15 years 8 months ago
Timed Concurrent Constraint Programming: Decidability Results and Their Application to LTL
Abstract The ntcc process calculus is a timed concurrent constraint programming (ccp) model equipped with a first-order linear-temporal logic (LTL) for expressing process specifi...
Frank D. Valencia