Sciweavers

1992 search results - page 217 / 399
» Model Based Testing with Labelled Transition Systems
Sort
View
152
Voted
IWIA
2006
IEEE
15 years 9 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
113
Voted
IH
1998
Springer
15 years 8 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
108
Voted
NAACL
1994
15 years 5 months ago
Japanese Word Segmentation by Hidden Markov Model
The processing of Japanese text is complicated by the fact that there are no word delimiters. To segment Japanese text, systems typically use knowledge-based methods and large lex...
Constantine Papageorgiou
152
Voted
CODES
2010
IEEE
15 years 1 months ago
Worst-case performance analysis of synchronous dataflow scenarios
Synchronous Dataflow (SDF) is a powerful analysis tool for regular, cyclic, parallel task graphs. The behaviour of SDF graphs however is static and therefore not always able to ac...
Marc Geilen, Sander Stuijk
94
Voted
CVPR
2008
IEEE
16 years 5 months ago
Accurate and robust registration for in-hand modeling
We present fast 3D surface registration methods for inhand modeling. This allows users to scan complete objects swiftly by simply turning them around in front of the scanner. The ...
Thibaut Weise, Bastian Leibe, Luc J. Van Gool