Sciweavers

5255 search results - page 932 / 1051
» Formal Methods for Privacy
Sort
View
150
Voted
ICDCS
2002
IEEE
15 years 8 months ago
The Complexity of Adding Failsafe Fault-Tolerance
In this paper, we focus our attention on the problem of automating the addition of failsafe fault-tolerance where fault-tolerance is added to an existing (fault-intolerant) progra...
Sandeep S. Kulkarni, Ali Ebnenasir
125
Voted
ICSM
2002
IEEE
15 years 8 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
149
Voted
TIME
2002
IEEE
15 years 8 months ago
Applying Local Search to Temporal Reasoning
Local search techniques have attracted considerable interest in the Artificial Intelligence (AI) community since the development of GSAT [9] and the min-conflicts heuristic [5] ...
John Thornton, Matthew Beaumont, Abdul Sattar, Mic...
MM
2009
ACM
168views Multimedia» more  MM 2009»
15 years 8 months ago
Identifying news videos' ideological perspectives using emphatic patterns of visual concepts
Television news has become the predominant way of understanding the world around us, but individual news broadcasters can frame or mislead an audience’s understanding of politic...
Wei-Hao Lin, Alexander G. Hauptmann
148
Voted
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 8 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...