Search Constraints
« Previous |
1 - 10 of 48
|
Next »
Search Results
Select an image to start the slideshow
Formalization and Verification of Rewriting-Based Security Polices
1 of 10
Noninterference in Concurrent Game Structures
2 of 10
Graph Decompositions and Monadic Second Order Logic
3 of 10
Multi-Decision Policy and Policy Combinator Specifications
4 of 10
First-Order Models for Configuration Analysis
5 of 10
A Framework for Exploring Finite Models
6 of 10
User Evaluation Framework for Model Finding Research
7 of 10
Analysis of social networks using Facebook
8 of 10
Wall Street Project
9 of 10
Trusted Execution Environments with Architectural Support: Foundations and Implementation
10 of 10