• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,043
Next 10 →

1 Specifying Usage Constraints for Components

by Wayne Deprince, Christine Hofmeister
"... Research to improve component reuse has focused on providing the specification of various behavior properties. In this paper we present our approach to this problem, which focuses not so much on specifying the behavior of the component, but instead on its architectural constraints. We introduce our ..."
Abstract - Add to MetaCart
Research to improve component reuse has focused on providing the specification of various behavior properties. In this paper we present our approach to this problem, which focuses not so much on specifying the behavior of the component, but instead on its architectural constraints. We introduce our

A Grammar for Specifying Usage Control Policies

by Carlos Maziero, Altair Santin
"... Abstract—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently proposed UCONABC model establishes an underlying mathematical frame-work to deal with the new needs of security and contr ..."
Abstract - Add to MetaCart
Abstract—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently proposed UCONABC model establishes an underlying mathematical frame-work to deal with the new needs of security

Mega: molecular evolutionary genetic analysis software for microcomputers

by Sudhir Kumar, Koichiro Tamura, Masatoshi Nei - CABIOS , 1994
"... A computer program package called MEGA has been developed for estimating evolutionary distances, reconstructing phylogenetic trees and computing basic statistical quantities from molecular data. It is written in C+ + and is intended to be used on IBM and IBM-compatible personal computers. In this pr ..."
Abstract - Cited by 505 (10 self) - Add to MetaCart
, new algorithms of branch-and-bound and heuristic searches are implemented. In addition, MEGA computes statistical quantities such as nucleotide and amino acid frequencies, transition/transversion biases, codon frequencies (codon usage tables), and the number of variable sites in specified segments

The SLAM project: debugging system software via static analysis

by Thomas Ball, Sriram K. Rajamani - SIGPLAN Not
"... Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two un ..."
Abstract - Cited by 472 (17 self) - Add to MetaCart
Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
of preserving privacy for the specified usage. In particular, we investigate the privacy transformation in the context of data mining applications like building classification and regression models. Second, our work improves on previous approaches by allowing more flexible generalizations for the data. Lastly

Usage

by David Ardia, Katharine Mullen, Brian Peterson, Joshua Ulrich, Maintainer Katharine Mullen
"... fn the function to be optimized (minimized). The function should have as its first argument the vector of real-valued parameters to optimize, and return a scalar real result. NA and NaN values are not allowed. lower, upper two vectors specifying scalar real lower and upper bounds on each parameter t ..."
Abstract - Add to MetaCart
fn the function to be optimized (minimized). The function should have as its first argument the vector of real-valued parameters to optimize, and return a scalar real result. NA and NaN values are not allowed. lower, upper two vectors specifying scalar real lower and upper bounds on each parameter

ABSTRACT Specifying and Checking Component Usage

by unknown authors
"... One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications describing how a component should be used and checks these specifications in real Java systems. Unlike previous systems, CHET ..."
Abstract - Add to MetaCart
One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications describing how a component should be used and checks these specifications in real Java systems. Unlike previous systems, CHET is able to check a wide range of complex conditions in large software systems without programmer intervention. This paper explores the specification techniques that are used in CHET and how they are able handle the types of specifications needed to accurately model and automatically identify component checks.

Usage Guidelines

by Dr Shân Wareing
"... License: None specified ..."
Abstract - Add to MetaCart
License: None specified

On-off control with specified fuel usage

by William Singhose , Tarunraj Singh , Warren Seering - J. Dyn. Syst. Meas. Control 1999
"... ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract not found

Formal Analyses of Usage Control Policies

by Alexander Pretschner, Fraunhofer Iese, Tu Kaiserslautern, Christian Schaefer, Thomas Walter - In Proc. AReS , 2009
"... Abstract—Usage control is a generalization of access control that also addresses how data is handled after it is released. Usage control requirements are specified in policies. We present tool support for the following analysis problems. Is a policy consistent, i.e., satisfiable? Is an abstractly sp ..."
Abstract - Cited by 15 (4 self) - Add to MetaCart
Abstract—Usage control is a generalization of access control that also addresses how data is handled after it is released. Usage control requirements are specified in policies. We present tool support for the following analysis problems. Is a policy consistent, i.e., satisfiable? Is an abstractly
Next 10 →
Results 1 - 10 of 2,043
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University