Sciweavers

963 search results - page 169 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
120
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
216
Voted
MICCAI
2000
Springer
15 years 7 months ago
Robust 3D Segmentation of Anatomical Structures with Level Sets
This paper is focused on the use of the level set formalism to segment anatomical structures in 3D images (ultrasound ou magnetic resonance images). A closed 3D surface propagates...
C. Baillard, Christian Barillot
116
Voted
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Passage time distributions in large Markov chains
Probability distributions of response times are important in the design and analysis of transaction processing systems and computercommunication systems. We present a general tech...
Peter G. Harrison, William J. Knottenbelt
156
Voted
IJBIS
2010
145views more  IJBIS 2010»
15 years 29 days ago
A multi-attribute group decision support system for information technology project selection
: The increasing intensity of global competition and the rapid advances in information technology (IT) have led organisations to search for more efficient and effective ways to man...
Faramak Zandi, Madjid Tavana
129
Voted
SPIN
2010
Springer
15 years 2 months ago
Context-Bounded Translations for Concurrent Software: An Empirical Evaluation
Abstract. Context-Bounded Analysis has emerged as a practical automatic formal analysis technique for fine-grained, shared-memory concurrent software. Two recent papers (in CAV 20...
Naghmeh Ghafari, Alan J. Hu, Zvonimir Rakamaric