Sciweavers

13987 search results - page 2574 / 2798
» The Two Guards Problem
Sort
View
PEPM
2009
ACM
14 years 5 months ago
Bidirectional data-flow analyses, type-systematically
We show that a wide class of bidirectional data-flow analyses and program optimizations based on them admit declarative descriptions in the form of type systems. The salient feat...
Maria João Frade, Ando Saabas, Tarmo Uustal...
CVPR
2010
IEEE
14 years 4 months ago
The chains model for detecting parts by their context
Detecting an object part relies on two sources of information - the appearance of the part itself, and the context supplied by surrounding parts. In this paper we consider problem...
Leonid Karlinsky, Michael Dinerstein, Daniel Harar...
WWW
2010
ACM
14 years 3 months ago
Inferring relevant social networks from interpersonal communication
Researchers increasingly use electronic communication data to construct and study large social networks, effectively inferring unobserved ties (e.g. i is connected to j) from obs...
Munmun De Choudhury, Winter A. Mason, Jake M. Hofm...
WWW
2010
ACM
14 years 3 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
WWW
2010
ACM
14 years 3 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
« Prev « First page 2574 / 2798 Last » Next »