Sciweavers

2004 search results - page 145 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
ICFEM
2009
Springer
15 years 9 months ago
An Empirical Study of Structural Constraint Solving Techniques
Structural constraint solving allows finding object graphs that satisfy given constraints, thereby enabling software reliability tasks, such as systematic testing and error recove...
Junaid Haroon Siddiqui, Sarfraz Khurshid
145
Voted
CIKM
2008
Springer
15 years 7 months ago
Natural language retrieval of grocery products
In this paper we describe modifications to a natural language grocery retrieval system, introduced in our earlier work. We also compare our system against an off-the-shelf retriev...
Petteri Nurmi, Eemil Lagerspetz, Wray L. Buntine, ...
126
Voted
SAC
2008
ACM
15 years 4 months ago
Using simplified event calculus in digital investigation
In a hypothesis-based approach to digital investigation, the investigator formulates his hypothesis about which events took place, and tests them using the evidence available. A f...
Svein Yngvar Willassen
196
Voted
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
15 years 6 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
ISW
2004
Springer
15 years 10 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier