Sciweavers

2838 search results - page 47 / 568
» Verifying Controlled Components
Sort
View
NPAR
2010
ACM
14 years 1 months ago
Sisley the abstract painter
We present an interactive abstract painting system named Sisley. Sisley works upon the psychological principle [Berlyne 1971] that abstract arts are often characterized by their gr...
Mingtian Zhao, Song Chun Zhu
ICASSP
2011
IEEE
13 years 19 days ago
Localized filtering for artifact removal in compressed images
The paper proposes a novel method for coding artifact reduction in compressed images. For removing blocking artifacts, a localized DCT-based filter with condition on the similari...
Dung Trung Vo, Truong Q. Nguyen
STTT
2008
134views more  STTT 2008»
13 years 8 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
CSREAPSC
2006
13 years 10 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
DSS
2000
107views more  DSS 2000»
13 years 8 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...