Sciweavers

2150 search results - page 262 / 430
» On a restricted cross-intersection problem
Sort
View
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
FORMATS
2008
Springer
15 years 5 months ago
Timed Parity Games: Complexity and Robustness
We consider two-player games played in real time on game structures with clocks and parity objectives. The games are concurrent in that at each turn, both players independently pro...
Krishnendu Chatterjee, Thomas A. Henzinger, Vinaya...
IJCAI
1989
15 years 4 months ago
Layering Predictions: Flexible Use of Dialog Expectation in Speech Recognition
entional user behavior, we need a principled mannerAbstract for relaxing contextual constraints when they are violated.When computer speech recognition is used for problem In order...
Sheryl R. Young, Wayne H. Ward, Alexander G. Haupt...
ATAL
2010
Springer
15 years 4 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
135
Voted
ICFP
2010
ACM
15 years 4 months ago
The impact of higher-order state and control effects on local relational reasoning
Reasoning about program equivalence is one of the oldest problems in semantics. In recent years, useful techniques have been developed, based on bisimulations and logical relation...
Derek Dreyer, Georg Neis, Lars Birkedal