Sciweavers

10435 search results - page 1830 / 2087
» Measuring system normality
Sort
View
FORTE
2008
15 years 5 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
HCI
2007
15 years 5 months ago
Real-Time Stereoscopic Conversion with Adaptable Viewing Distance at Personal Stereoscopic Viewing Devices
This paper proposes the real-time stereoscopic conversion method with adaptable viewing distance by the viewer’s eye detection at personal stereoscopic viewing devices. The dista...
Ilkwon Park, Hyeran Byun
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 5 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
IJCAI
2007
15 years 5 months ago
Towards an Integration of Golog and Planning
The action language Golog has been applied successfully to the control of robots, among other things. Perhaps its greatest advantage is that a user can write programs which constr...
Jens Claßen, Patrick Eyerich, Gerhard Lakeme...
MASCOTS
2008
15 years 5 months ago
Modelling and Validation of Response Times in Zoned RAID
We present and validate an enhanced analytical queueing network model of zoned RAID. The model focuses on RAID levels 01 and 5, and yields the distribution of I/O request response...
Abigail S. Lebrecht, Nicholas J. Dingle, William J...
« Prev « First page 1830 / 2087 Last » Next »