Sciweavers

15375 search results - page 121 / 3075
» cans 2008
Sort
View
STTT
2008
134views more  STTT 2008»
15 years 3 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
INFSOF
2007
148views more  INFSOF 2007»
15 years 3 months ago
Mutating database queries
A set of mutation operators for SQL queries that retrieve information from a database is developed and tested against a set of queries drawn from the NIST SQL Conformance Test Sui...
Javier Tuya, María José Suáre...
TCS
2008
15 years 3 months ago
A unified approach to finding good stable matchings in the hospitals/residents setting
The hospitals/residents (HR) problem is a many-to-one generalization of the stable marriage (SM) problem. Researchers have been interested in variants of stable matchings that eit...
Christine Cheng, Eric McDermid, Ichiro Suzuki
144
Voted
TCS
2008
15 years 3 months ago
Integration of a security type system into a program logic
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensu...
Reiner Hähnle, Jing Pan, Philipp Rümmer,...
IVC
2007
138views more  IVC 2007»
15 years 3 months ago
Silhouette lookup for monocular 3D pose tracking
Computers should be able to detect and track the articulated 3-D pose of a human being moving through a video sequence. Incremental tracking methods often prove slow and unreliabl...
Nicholas R. Howe