Sciweavers

640 search results - page 80 / 128
» Discovering State Invariants
Sort
View
WS
2006
ACM
15 years 5 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
CCCG
2003
15 years 1 months ago
On Coherent Rotation Angles for As-Rigid-As-Possible Shape Interpolation
Morphing algorithms aim to construct visually pleasing interpolations (morphs) between 2D or 3D shapes. One of the desirable properties of a morph is avoiding selfintersections of...
Jaeil Choi, Andrzej Szymczak
POPL
2002
ACM
16 years 4 days ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...
ISW
2007
Springer
15 years 6 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
CVPR
2007
IEEE
16 years 1 months ago
An Exemplar Model for Learning Object Classes
We introduce an exemplar model that can learn and generate a region of interest around class instances in a training set, given only a set of images containing the visual class. T...
Ondrej Chum, Andrew Zisserman