Sciweavers

2259 search results - page 43 / 452
» Separation and information hiding
Sort
View
LICS
2006
IEEE
14 years 2 months ago
Independence and Concurrent Separation Logic
A compositional Petri net based semantics is given to a simple pointer-manipulating language. The model is then applied to give a notion of validity to the judgements made by conc...
Jonathan Hayman, Glynn Winskel
HUC
2009
Springer
14 years 1 months ago
On the Feasibility of Determining Angular Separation in Mobile Wireless Sensor Networks
Mobile sensors require periodic position measurements for navigation around the sensing region. Such information is often obtained using GPS or onboard sensors such as optical enco...
Isaac Amundson, Manish Kushwaha, Xenofon D. Koutso...
CAISE
2008
Springer
13 years 10 months ago
Concern-Sensitive Navigation: Improving Navigation in Web Software through Separation of Concerns
Abstract. Traditionally, the use of good techniques to improve software modularity, such as advanced separation of concerns, has no impact in the user experience, for example while...
Jocelyne Nanard, Gustavo Rossi, Marc Nanard, Silvi...
IMC
2007
ACM
13 years 10 months ago
Blind source separation approach to performance diagnosis and dependency discovery
We consider the problem of diagnosing performance problems in distributed system and networks given end-to-end performance measurements provided by test transactions, or probes. C...
Gaurav Chandalia, Irina Rish
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 20 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...