Sciweavers

2838 search results - page 47 / 568
» Verifying Controlled Components
Sort
View
NPAR
2010
ACM
15 years 7 months ago
Sisley the abstract painter
We present an interactive abstract painting system named Sisley. Sisley works upon the psychological principle [Berlyne 1971] that abstract arts are often characterized by their gr...
Mingtian Zhao, Song Chun Zhu
92
Voted
ICASSP
2011
IEEE
14 years 5 months ago
Localized filtering for artifact removal in compressed images
The paper proposes a novel method for coding artifact reduction in compressed images. For removing blocking artifacts, a localized DCT-based filter with condition on the similari...
Dung Trung Vo, Truong Q. Nguyen
118
Voted
STTT
2008
134views more  STTT 2008»
15 years 2 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
145
Voted
CSREAPSC
2006
15 years 3 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
106
Voted
DSS
2000
107views more  DSS 2000»
15 years 2 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...