Sciweavers

1054 search results - page 172 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 5 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
FASE
2006
Springer
15 years 5 months ago
Relation of Code Clones and Change Couplings
Abstract. Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution. It is broadly assumed that the ...
Reto Geiger, Beat Fluri, Harald Gall, Martin Pinzg...
ACSAC
2008
IEEE
15 years 4 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
ATAL
2008
Springer
15 years 4 months ago
Coordination in ambiguity: coordinated active localization for multiple robots
In environments which possess relatively few features that enable a robot to unambiguously determine its location, global localization algorithms can result in multiple hypotheses...
Shivudu Bhuvanagiri, K. Madhava Krishna, Supreeth ...
ACL
2006
15 years 3 months ago
Novel Association Measures Using Web Search with Double Checking
A web search with double checking model is proposed to explore the web as a live corpus. Five association measures including variants of Dice, Overlap Ratio, Jaccard, and Cosine, ...
Hsin-Hsi Chen, Ming-Shun Lin, Yu-Chuan Wei