Sciweavers

1894 search results - page 302 / 379
» A TLA Proof System
Sort
View
SOUPS
2006
ACM
15 years 9 months ago
Human selection of mnemonic phrase-based passwords
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to stre...
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
141
Voted
CRV
2005
IEEE
198views Robotics» more  CRV 2005»
15 years 9 months ago
Analysis of Player Actions in Selected Hockey Game Situations
We present a proof of concept system to represent and reason about hockey play. The system takes as input player motion trajectory data tracked from game video and supported by kn...
Fahong Li, Robert J. Woodham
LICS
2005
IEEE
15 years 9 months ago
Uniform Distributed Synthesis
We provide a uniform solution to the problem of synthesizing a finite-state distributed system. An instance of the synthesis problem consists of a system architecture and a tempo...
Bernd Finkbeiner, Sven Schewe
RTAS
2005
IEEE
15 years 9 months ago
On Schedulability Bounds of Static Priority Schedulers
—Real-time systems need to use the schedulability test to determine whether or not admitted tasks can meet their deadlines. The utilization based schedulability test is the most ...
Jianjia Wu, Jyh-Charn Liu, Wei Zhao
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
15 years 9 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...