Sciweavers

1147 search results - page 55 / 230
» Transformation of Access Rights
Sort
View
POPL
2005
ACM
14 years 9 months ago
From sequential programs to multi-tier applications by program transformation
Modern applications are designed in multiple tiers to separate concerns. Since each tier may run at a separate location, middleware is required to mediate access between tiers. Ho...
Matthias Neubauer, Peter Thiemann
ASM
2010
ASM
14 years 3 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
ICASSP
2009
IEEE
14 years 3 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
SIPS
2008
IEEE
14 years 3 months ago
Efficient image reconstruction using partial 2D Fourier transform
In this paper we present an efficient way of doing image reconstruction using the 2D Discrete Fourier transform (DFT). We exploit the fact that in the frequency domain, informati...
Lanping Deng, Chi-Li Yu, Chaitali Chakrabarti, Jun...
IEEEPACT
2009
IEEE
14 years 3 months ago
Automatic Tuning of Discrete Fourier Transforms Driven by Analytical Modeling
—Analytical models have been used to estimate optimal values for parameters such as tile sizes in the context of loop nests. However, important algorithms such as fast Fourier tr...
Basilio B. Fraguela, Yevgen Voronenko, Markus P&uu...