Sciweavers

4340 search results - page 746 / 868
» Formal Methods and Cryptography
Sort
View
131
Voted
EDOC
2002
IEEE
15 years 9 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
ICDCS
2002
IEEE
15 years 9 months ago
The Complexity of Adding Failsafe Fault-Tolerance
In this paper, we focus our attention on the problem of automating the addition of failsafe fault-tolerance where fault-tolerance is added to an existing (fault-intolerant) progra...
Sandeep S. Kulkarni, Ali Ebnenasir
ICSM
2002
IEEE
15 years 9 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
TIME
2002
IEEE
15 years 9 months ago
Applying Local Search to Temporal Reasoning
Local search techniques have attracted considerable interest in the Artificial Intelligence (AI) community since the development of GSAT [9] and the min-conflicts heuristic [5] ...
John Thornton, Matthew Beaumont, Abdul Sattar, Mic...
177
Voted
MM
2009
ACM
168views Multimedia» more  MM 2009»
15 years 9 months ago
Identifying news videos' ideological perspectives using emphatic patterns of visual concepts
Television news has become the predominant way of understanding the world around us, but individual news broadcasters can frame or mislead an audience’s understanding of politic...
Wei-Hao Lin, Alexander G. Hauptmann