Sciweavers

17018 search results - page 123 / 3404
» From the How to the What
Sort
View
101
Voted
TSE
1998
131views more  TSE 1998»
15 years 10 days ago
Experiences Using Lightweight Formal Methods for Requirements Modeling
—This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies diffe...
Steve M. Easterbrook, Robyn R. Lutz, Richard Covin...
93
Voted
CVPR
2005
IEEE
16 years 2 months ago
Energy Minimization via Graph Cuts: Settling What is Possible
The recent explosion of interest in graph cut methods in computer vision naturally spawns the question: what energy functions can be minimized via graph cuts? This question was fi...
Daniel Freedman, Petros Drineas
74
Voted
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 6 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
DAGSTUHL
2004
15 years 2 months ago
What is a Model?
Abstract. With the recent trend to model driven development a commonly agreed notion of "model" becomes a pivotal issue. However, currently there is little consensus abou...
Thomas Kühne
ASIACRYPT
2000
Springer
15 years 5 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...