Sciweavers

30 search results - page 6 / 6
» Trio2Promela: A Model Checker for Temporal Metric Specificat...
Sort
View
ICSE
2008
IEEE-ACM
14 years 5 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICMCS
2008
IEEE
156views Multimedia» more  ICMCS 2008»
13 years 11 months ago
Human attention model for semantic scene analysis in movies
In this paper, we specifically propose the Weber-Fechner Law-based human attention model for semantic scene analysis in movies. Different from traditional video processing techniq...
Anan Liu, Yongdong Zhang, Yan Song, Dongming Zhang...
AOSD
2009
ACM
13 years 7 months ago
Modular verification of dynamically adaptive systems
Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
Ji Zhang, Heather Goldsby, Betty H. C. Cheng
CCS
2008
ACM
13 years 7 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
PERCOM
2007
ACM
14 years 4 months ago
Context Aware Routing of Enterprise User Communications
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...