Sciweavers

1497 search results - page 231 / 300
» Extended static checking
Sort
View
99
Voted
AMC
2005
138views more  AMC 2005»
15 years 18 days ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
139
Voted
TII
2008
98views more  TII 2008»
15 years 18 days ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux
109
Voted
DGCI
2005
Springer
15 years 6 months ago
Algorithms for the Topological Watershed
The watershed transformation is an efficient tool for segmenting grayscale images. An original approach to the watershed [1,9] consists in modifying the original image by lowering...
Michel Couprie, Laurent Najman, Gilles Bertrand
PVLDB
2008
117views more  PVLDB 2008»
14 years 11 months ago
Interactive source registration in community-oriented information integration
Modern Internet communities need to integrate and query structured information. Employing current information integration infrastructure, data integration is still a very costly e...
Yannis Katsis, Alin Deutsch, Yannis Papakonstantin...
110
Voted
JAPLL
2010
104views more  JAPLL 2010»
14 years 11 months ago
Group announcement logic
Two currently active strands of research on logics for multi-agent systems are dynamic epistemic logic, focusing on the epistemic consequences of actions, and logics of coalitiona...
Thomas Ågotnes, Philippe Balbiani, Hans P. v...