Sciweavers

1986 search results - page 95 / 398
» constraints 2006
Sort
View
CASCON
2006
149views Education» more  CASCON 2006»
13 years 9 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
DEON
2006
Springer
13 years 9 months ago
A Logical Architecture of a Normative System
Abstract. Logical architectures combine several logics into a more complex logical system. In this paper we study a logical architecture using input/output operations corresponding...
Guido Boella, Leendert W. N. van der Torre
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 9 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
APPML
2006
105views more  APPML 2006»
13 years 7 months ago
Stability margins for generalized state space systems
In this work we extend results from the literature on H design with pole placement constraints to the case of generalized state space models, for both continuous-time and discrete...
Djilali Bouagada, Paul Van Dooren
OR
2006
Springer
13 years 7 months ago
Online Dial-A-Ride Problem with Time Windows: An Exact Algorithm Using Status Vectors
The Dial-A-Ride Problem (DARP) has often been used to organize transport of elderly and handicapped people, assuming that these people can book their transport in advance. But the ...
Anke Fabri, Peter Recht