Sciweavers

581 search results - page 107 / 117
» Translating dependency into parametricity
Sort
View
PLDI
2010
ACM
14 years 7 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
ICDT
2010
ACM
211views Database» more  ICDT 2010»
14 years 7 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
VR
2009
IEEE
167views Virtual Reality» more  VR 2009»
14 years 4 months ago
High Resolution Video Playback in Immersive Virtual Environments
High resolution 2D video content in High Definition or higher resolutions has become widespread and video playback of such media in immersive virtual environments (VE) will be a ...
Han Suk Kim, Jürgen P. Schulze
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
14 years 4 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...