Sciweavers

3316 search results - page 494 / 664
» Mining Software Engineering Data
Sort
View
VMCAI
2005
Springer
15 years 7 months ago
Optimizing Bounded Model Checking for Linear Hybrid Systems
Bounded model checking (BMC) is an automatic verification method that is based on a finite unfolding of the system’s transition relation. BMC has been successfully applied, in ...
Erika Ábrahám, Bernd Becker, Felix K...
113
Voted
VMCAI
2005
Springer
15 years 7 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
114
Voted
IUI
2004
ACM
15 years 7 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
IUI
2004
ACM
15 years 7 months ago
Classifying and assessing tremor movements for applications in man-machine intelligent user interfaces
We introduce a new intelligent user interface (IUI) and, also, a new methodology to identify the fatigue state for healthy subjects. The fatigue state is determined by means of a ...
Dan Marius Dobrea, Horia-Nicolai L. Teodorescu
103
Voted
EDBTW
2004
Springer
15 years 7 months ago
A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems
The two main approaches to find data in peer-to-peer (P2P) systems are unstructured networks using flooding and structured networks using a distributed index. A distributed index i...
Fabius Klemm, Anwitaman Datta, Karl Aberer