Sciweavers

1895 search results - page 348 / 379
» Using ATL for Checking Models
Sort
View
TDSC
2008
152views more  TDSC 2008»
13 years 9 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
CAGD
2002
97views more  CAGD 2002»
13 years 9 months ago
Hierarchical multiresolution reconstruction of shell surfaces
We present an adaptive, hierarchical Hh-multiresolution reconstruction algorithm to model shell surface objects from a matched pair of triangulated surfaces. Shell surfaces are an...
Chandrajit L. Bajaj, Guoliang Xu, Robert J. Holt, ...
ACSAC
2010
IEEE
13 years 7 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
GEOINFORMATICA
2011
13 years 4 months ago
Functional description of geoprocessing services as conjunctive datalog queries
Discovery of suitable web services is a crucial task in Spatial Data Infrastructures (SDI). In this work, we develop a novel approach to the discovery of geoprocessing services (WP...
Daniel Fitzner, Jörg Hoffmann, Eva Klien
PE
2011
Springer
214views Optimization» more  PE 2011»
13 years 4 months ago
Time-bounded reachability in tree-structured QBDs by abstraction
Structured QBDs by Abstraction Daniel Klink, Anne Remke, Boudewijn R. Haverkort, Fellow, IEEE, and Joost-Pieter Katoen, Member, IEEE Computer Society —This paper studies quantita...
Daniel Klink, Anne Remke, Boudewijn R. Haverkort, ...