Sciweavers

1150 search results - page 105 / 230
» Specifying Information-Flow Controls
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
SEFM
2005
IEEE
14 years 1 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
WORDS
2002
IEEE
14 years 1 months ago
An Adaptive Distributed System Based on Conditional Dependencies
Distributed programming is applicable in a wide range of domains such as control systems. These systems are subject to mutable environments and must also provide a time varying ad...
Luci Pirmez, Luiz F. Rust da Costa Carmo, Reinaldo...
RIDE
1999
IEEE
14 years 17 days ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu
CAGD
2005
118views more  CAGD 2005»
13 years 8 months ago
Curve modeling with constrained B-spline wavelets
In this paper we present a novel approach to construct B-spline wavelets under constraints, taking advantage of the lifting scheme. Constrained B-spline wavelets allow multiresolu...
Denggao Li, Kaihuai Qin, Hanqiu Sun