Sciweavers

1147 search results - page 102 / 230
» Transformation of Access Rights
Sort
View
IFL
1997
Springer
153views Formal Methods» more  IFL 1997»
14 years 1 months ago
Common Subexpressions Are Uncommon in Lazy Functional Languages
Common subexpression elimination is a well-known compiler optimisation that saves time by avoiding the repetition of the same computation. In lazy functional languages, referential...
Olaf Chitil
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Real-time scalable video codec implementation for surveillance
In this paper, we discuss the design and real-time implementation of a Scalable Video Codec (SVC) for surveillance applications. We present a complexity-scalable temporal wavelet ...
Marijn J. H. Loomans, Cornelis J. Koeleman, Peter ...
POPL
2008
ACM
14 years 9 months ago
Boomerang: resourceful lenses for string data
A lens is a bidirectional program. When read from left to right, it denotes an ordinary function that maps inputs to outputs. When read from right to left, it denotes an "upd...
Aaron Bohannon, J. Nathan Foster, Benjamin C. Pier...
IEEEARES
2008
IEEE
14 years 3 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
TRUSTBUS
2007
Springer
14 years 2 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser