Sciweavers

1415 search results - page 181 / 283
» Verified systems by composition from verified components
Sort
View
OOIS
2001
Springer
14 years 2 months ago
An Object-Oriented Framework for Developing Information Retrieval Applications
Abstract. Design and development of information retrieval IR systems is a complex and expensive process. In the process of building an IR system, developers need to explore a lar...
Joemon M. Jose, David G. Hendry, David J. Harper
CSFW
2012
IEEE
12 years 21 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 5 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
ESORICS
2008
Springer
14 years 1 days ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
COLING
2000
13 years 11 months ago
Deixis and Conjunction in Multimodal Systems
In order to realize their full potential, multimodal interfaces need to support not just input from multiple modes, but single commands optimally distributed across the available ...
Michael Johnston