Sciweavers

2084 search results - page 290 / 417
» Set Constraints in Logic Programming
Sort
View
ACMSE
2006
ACM
15 years 8 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
CORR
2011
Springer
245views Education» more  CORR 2011»
14 years 10 months ago
A linear framework for region-based image segmentation and inpainting involving curvature penalization
Abstract We present the first method to handle curvature regularity in region-based image segmentation and inpainting that is independent of initialization. To this end we start f...
Thomas Schoenemann, Fredrik Kahl, Simon Masnou, Da...
99
Voted
DAC
2010
ACM
15 years 6 months ago
An efficient algorithm to verify generalized false paths
Timing exception verification has become a center of interest as incorrect constraints can lead to chip failures. Proving that a false path is valid or not is a difficult problem ...
Olivier Coudert
CORR
2010
Springer
186views Education» more  CORR 2010»
15 years 3 months ago
A Homogeneous Reaction Rule Language for Complex Event Processing
Event-driven automation of reactive functionalities for complex event processing is an urgent need in today's distributed service-oriented architectures and Web-based event-d...
Adrian Paschke, Alexander Kozlenkov, Harold Boley
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 9 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart