Sciweavers

647 search results - page 77 / 130
» Regular Symmetry Patterns
Sort
View
EUROSYS
2007
ACM
14 years 6 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
AIMS
2007
Springer
14 years 3 months ago
Improving Anomaly Detection Event Analysis Using the EventRank Algorithm
Abstract. We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is ...
Kyrre M. Begnum, Mark Burgess
FMCAD
2007
Springer
14 years 3 months ago
Induction in CEGAR for Detecting Counterexamples
— Induction has been studied in model checking for proving the validity of safety properties, i.e., showing the absence of counterexamples. To our knowledge, induction has not be...
Chao Wang, Aarti Gupta, Franjo Ivancic
IWCM
2004
Springer
14 years 2 months ago
Divide-and-Conquer Strategies for Estimating Multiple Transparent Motions
Abstract. Motion estimation is essential in a variety of image processing and computer vision tasks, like video coding, tracking, directional filtering and denoising, scene analys...
Cicero Mota, Ingo Stuke, Til Aach, Erhardt Barth
CSMR
1998
IEEE
14 years 1 months ago
Assessing Architectural Complexity
While it is widely agreed that architectural simplicity is a key factor to the success of large software systems, it is not obvious how to measure architectural complexity. Our ap...
Rick Kazman, M. Burth