Sciweavers

700 search results - page 29 / 140
» Combinations of Stit and Actions
Sort
View
122
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 5 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
104
Voted
CVPR
2007
IEEE
16 years 13 days ago
A Human Action Recognition System for Embedded Computer Vision Application
In this paper, we propose a human action recognition system suitable for embedded computer vision applications in security systems, human-computer interaction and intelligent envi...
Hongying Meng, Nick Pears, Chris Bailey
FMICS
2007
Springer
15 years 4 months ago
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications
Abstract. In this paper we present an action/state-based logical framework for the analysis and verification of complex systems, which relies on the definition of doubly labelled...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...
ACMDIS
2008
ACM
15 years 13 days ago
Supporting cooperative teamwork: information, action and communication in sailing
This paper provides details of an in-depth investigation into how racing sailors use information displays and devices, and shows that these devices act as communication loci and i...
Russell Beale
LWA
2007
14 years 12 months ago
Prediction Algorithms for User Actions
Proactive User Interfaces (PUIs) aim at facilitating the interaction with a user interface, e.g., by highlighting fields or adapting the interface. For that purpose, they need to...
Melanie Hartmann, Daniel Schreiber