Sciweavers

106 search results - page 18 / 22
» Security Types Preserving Compilation: (Extended Abstract)
Sort
View
OOPSLA
2005
Springer
14 years 28 days ago
Javari: adding reference immutability to Java
This paper describes a type system that is capable of expressing and enforcing immutability constraints. The speonstraint expressed is that the abstract state of the object to whi...
Matthew S. Tschantz, Michael D. Ernst
ACCV
2007
Springer
14 years 1 months ago
Comparative Studies on Multispectral Palm Image Fusion for Biometrics
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi...
Ying Hao, Zhenan Sun, Tieniu Tan
ESORICS
2005
Springer
14 years 29 days ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
CDC
2009
IEEE
139views Control Systems» more  CDC 2009»
14 years 5 days ago
Reachability analysis for continuous systems under shared control: Application to user-interface design
— We extend techniques for a reachability-based ion to continuous systems under shared control, that is, systems which have both inputs controlled by the automation and inputs co...
Nikolai Matni, Meeko Oishi
CGO
2009
IEEE
13 years 11 months ago
Communication-Sensitive Static Dataflow for Parallel Message Passing Applications
Message passing is a very popular style of parallel programming, used in a wide variety of applications and supported by many APIs, such as BSD sockets, MPI and PVM. Its importance...
Greg Bronevetsky