Sciweavers

1518 search results - page 76 / 304
» Cryptographic Test Correction
Sort
View
97
Voted
ICPR
2010
IEEE
15 years 3 months ago
A Hypothesis Testing Approach for Fluorescent Blob Identification
Template matching is a common approach for identifying fluorescent objects within a biological image. But how to decide a threshold value for the purpose of justifying the goodness...
Le-Shin Wu, Sidney Shaw
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 7 months ago
Improved worst-case response-time calculations by upper-bound conditions
Fast real-time feasibility tests and analysis algorithms are necessary for a high acceptance of the formal techniques by industrial software engineers. This paper presents a possi...
Victor Pollex, Steffen Kollmann, Karsten Albers, F...
ICSE
2008
IEEE-ACM
16 years 20 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
119
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya