Sciweavers

533 search results - page 62 / 107
» Verification of Distributed Firewalls
Sort
View
SIGSOFT
2010
ACM
13 years 7 months ago
Embracing policy engineering
Declarative policies play a central role in many modern software systems. Engineering policies and their interactions with programs raises many interesting open questions. Categor...
Kathi Fisler, Shriram Krishnamurthi, Daniel J. Dou...
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 9 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
14 years 2 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...
CCS
2008
ACM
13 years 12 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
CVPR
2009
IEEE
2216views Computer Vision» more  CVPR 2009»
15 years 5 months ago
Object Detection using a Max-Margin Hough Transform
We present a discriminative Hough transform based ob- ject detector where each local part casts a weighted vote for the possible locations of the object center. We show that the ...
Subhransu Maji (University of California, Berkeley...