Sciweavers

9231 search results - page 1635 / 1847
» informs 2008
Sort
View
153
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 4 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
15 years 4 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
131
Voted
TAP
2008
Springer
94views Hardware» more  TAP 2008»
15 years 4 months ago
Vacuity in Testing
Abstract. In recent years, we see a growing awareness to the importance of assessing the quality of specifications. In the context of model checking, this can be done by analyzing ...
Thomas Ball, Orna Kupferman
147
Voted
TASE
2008
IEEE
15 years 4 months ago
Automated Planning and Optimization of Lumber Production Using Machine Vision and Computed Tomography
An automated system for planning and optimization of lumber production using Machine Vision and Computed Tomography (CT) is proposed. Cross-sectional CT images of hardwood logs are...
Suchendra M. Bhandarkar, Xingzhi Luo, Richard F. D...
VR
2008
IEEE
175views Virtual Reality» more  VR 2008»
15 years 4 months ago
Managing Visual Clutter: A Generalized Technique for Label Segregation using Stereoscopic Disparity
We present a new technique for managing visual clutter caused by overlapping labels in complex information displays. This technique, "label layering", utilizes stereosco...
Stephen Peterson, Magnus Axholt, Stephen R. Ellis
« Prev « First page 1635 / 1847 Last » Next »