Sciweavers

1986 search results - page 238 / 398
» constraints 2006
Sort
View
ESORICS
2006
Springer
13 years 12 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
EUC
2006
Springer
13 years 11 months ago
Custom Instruction Generation Using Temporal Partitioning Techniques for a Reconfigurable Functional Unit
Extracting appropriate custom instructions is an important phase for implementing an application on an extensible processor with a reconfigurable functional unit (RFU). Custom inst...
Farhad Mehdipour, Hamid Noori, Morteza Saheb Zaman...
EWSA
2006
Springer
13 years 11 months ago
Component Deployment Evolution Driven by Architecture Patterns and Resource Requirements
Software architectures are often designed with respect to some architecture patterns, like the pipeline and peer-to-peer. These patterns are the guarantee of some quality attribute...
Didier Hoareau, Chouki Tibermacine
FATES
2006
Springer
13 years 11 months ago
A Test Calculus Framework Applied to Network Security Policies
Abstract. We propose a syntax-driven test generation technique to auly derive abstract test cases from a set of requirements expressed in a linear temporal logic. Assuming that an ...
Yliès Falcone, Jean-Claude Fernandez, Laure...
GD
2006
Springer
13 years 11 months ago
Choosing Colors for Geometric Graphs Via Color Space Embeddings
Graph drawing research traditionally focuses on producing geometric embeddings of graphs satisfying various aesthetic constraints. However additional work must still be done to dra...
Michael B. Dillencourt, David Eppstein, Michael T....