Sciweavers

740 search results - page 105 / 148
» Open Answer Set Programming with Guarded Programs
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
CASCON
2001
96views Education» more  CASCON 2001»
13 years 9 months ago
Integrating SHriMP with the IBM websphere studio workbench
This paper provides an experience report for researchers who are interested in integrating their tools with the new IBM WebSphere Studio Workbench. The Workbench (open source at w...
Derek Rayside, Marin Litoiu, Margaret-Anne D. Stor...
PODS
2004
ACM
148views Database» more  PODS 2004»
14 years 8 months ago
Deterministic Wavelet Thresholding for Maximum-Error Metrics
Several studies have demonstrated the effectiveness of the wavelet decomposition as a tool for reducing large amounts of data down to compact wavelet synopses that can be used to ...
Minos N. Garofalakis, Amit Kumar
ITICSE
2004
ACM
14 years 1 months ago
Using interactive technology in a short java course: an experience report
Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Roberto E. Lopez-Herrejon, Morrie Schulman
WCRE
2006
IEEE
14 years 1 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit