Sciweavers

813 search results - page 58 / 163
» Pipeline-centric provenance model
Sort
View
FASE
2003
Springer
14 years 3 months ago
Detecting Implied Scenarios Analyzing Non-local Branching Choices
Scenarios are powerful tools to model and analyze software systems. However, since they do not provide a complete description of the system, but just some possible execution paths,...
Henry Muccini
CDC
2009
IEEE
117views Control Systems» more  CDC 2009»
14 years 2 months ago
A limiting property of the matrix exponential with application to multi-loop control
— A limiting property of the matrix exponential is proven: For a real square matrix, where the log norm of the upper-left n by n block approaches negative infinity in a limiting...
Sebastian Trimpe, Raffaello D'Andrea
ICALP
2001
Springer
14 years 2 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
AIRWEB
2006
Springer
14 years 1 months ago
Adversarial Information Retrieval Aspects of Sponsored Search
Search engines are commercial entities that require revenue to survive. The most prevalent revenue stream for search engines is sponsored search, where content providers have sear...
Bernard J. Jansen
CSCWD
2008
Springer
13 years 12 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng