Sciweavers

1222 search results - page 161 / 245
» A Bayesian Approach to Model Checking Biological Systems
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
KES
2005
Springer
15 years 9 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
COORDINATION
2009
Springer
16 years 4 months ago
Assume-Guarantee Verification of Concurrent Systems
Process algebras are a set of mathematically rigourous languages with well defined semantics that permit modelling behaviour of concurrent and communicating systems. Verification o...
Liliana D'Errico, Michele Loreti
ICFCA
2010
Springer
15 years 10 months ago
Describing Role Models in Terms of Formal Concept Analysis
Abstract. In the past years Software Engineering has experienced several difficulties in modularising crosscutting aspects, like shared, dynamic or scattered behavior of object-ori...
Henri Mühle, Christian Wende
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 9 months ago
Modeling Current Events
Enormous amounts of information are produced every day, all over the world. but very little of it is true. In this paper, we describe the modeling component of a current events an...
Christopher Landauer, Kirstie L. Bellman