Sciweavers

1796 search results - page 185 / 360
» An Approach to Compositional Model Checking
Sort
View
90
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
EMSOFT
2004
Springer
15 years 6 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
85
Voted
KBSE
2007
IEEE
15 years 6 months ago
Sequential circuits for program analysis
A number of researchers have proposed the use of Boolean satisfiability solvers for verifying C programs. They encode correctness checks as Boolean formulas using finitization: ...
Fadi A. Zaraket, Adnan Aziz, Sarfraz Khurshid
ECCV
2008
Springer
16 years 2 months ago
What Is a Good Image Segment? A Unified Approach to Segment Extraction
Abstract. There is a huge diversity of definitions of "visually meaningful" image segments, ranging from simple uniformly colored segments, textured segments, through sym...
Shai Bagon, Oren Boiman, Michal Irani
112
Voted
ISCC
2006
IEEE
188views Communications» more  ISCC 2006»
15 years 6 months ago
Dejong Function Optimization by Means of a Parallel Approach to Fuzzified Genetic Algorithm
Genetic Algorithms are very powerful search methods that are used in different optimization problems. Parallel versions of genetic algorithms are easily implemented and usually in...
Ebrahim Bagheri, Hossein Deldari