Sciweavers

4270 search results - page 81 / 854
» A Permutation Approach to Validation
Sort
View
FM
2003
Springer
88views Formal Methods» more  FM 2003»
15 years 9 months ago
Java Applet Correctness: A Developer-Oriented Approach
This paper presents experiments on formal validation of Java applets. It describes a tool that has been developed at the Gemplus Research Labs. This tool allows to formally prove J...
Lilian Burdy, Antoine Requet, Jean-Louis Lanet
WEBI
2010
Springer
15 years 2 months ago
Ranking Approaches for Microblog Search
Ranking microblogs, such as tweets, as search results for a query is challenging, among other things because of the sheer amount of microblogs that are being generated in real time...
Rinkesh Nagmoti, Ankur Teredesai, Martine De Cock
EJWCN
2010
237views more  EJWCN 2010»
14 years 11 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
ECCV
2002
Springer
16 years 6 months ago
Maximizing Rigidity: Optimal Matching under Scaled-Orthography
Establishing point correspondences between images is a key step for 3D-shape computation. Nevertheless, shape extraction and point correspondence are treated, usually, as two diffe...
João Costeira, João Maciel
ASIACRYPT
2009
Springer
15 years 11 months ago
Rebound Attack on the Full Lane Compression Function
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear messag...
Krystian Matusiewicz, María Naya-Plasencia,...