Sciweavers

495 search results - page 83 / 99
» Translating the Object Constraint Language into the Java Mod...
Sort
View
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 8 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
ICMCS
1999
IEEE
234views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Spatiotemporal Segmentation and Tracking of Objects for Visualization of Videoconference Image Sequences
Abstract--In this paper, a procedure is described for the segmentation, content-based coding, and visualization of videoconference image sequences. First, image sequence analysis i...
Ioannis Kompatsiaris, Michael G. Strintzis
IEEEARES
2007
IEEE
14 years 3 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
DLT
2008
13 years 10 months ago
Emptiness of Multi-pushdown Automata Is 2ETIME-Complete
We consider multi-pushdown automata, a multi-stack extension of pushdown automata that comes with a constraint on stack operations: a pop can only be performed on the first non-emp...
Mohamed Faouzi Atig, Benedikt Bollig, Peter Haberm...
SMA
1995
ACM
190views Solid Modeling» more  SMA 1995»
14 years 8 days ago
Creating solid models from single 2D sketches
We describe a method of constructing a B-rep solid model from a single hidden-line removed sketch view of a 3D object. The main steps of our approach are as follows. The sketch is...
Ian J. Grimstead, Ralph R. Martin