Sciweavers

1795 search results - page 100 / 359
» Security Models and Information Flow
Sort
View
141
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
157
Voted
ICCV
1999
IEEE
15 years 8 months ago
Multi-Frame Optical Flow Estimation using Subspace Constraints
We show that the set of all ow- elds in a sequence of frames imaging a rigid scene resides in a lowdimensional linear subspace. Based on this observation, we develop a method for ...
Michal Irani
134
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
Data Flow Analysis for Checking Properties of Concurrent Java Programs
In this paper we show how the FLAVERS data flow analysis technique, originally formulated for programs with the rendezvous model of concurrency, can be applied to concurrent Java...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke
131
Voted
CAISE
2006
Springer
15 years 7 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
138
Voted
ECIR
2010
Springer
15 years 5 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang