Sciweavers

5355 search results - page 337 / 1071
» Modules
Sort
View
127
Voted
APN
2003
Springer
15 years 9 months ago
Model Checking Safety Properties in Modular High-Level Nets
Model checking by exhaustive state space enumeration is one of the most developed analysis methods for distributed event systems. Its main problem—the size of the state spaces—...
Marko Mäkelä
125
Voted
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 9 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
145
Voted
EMO
2003
Springer
162views Optimization» more  EMO 2003»
15 years 9 months ago
PISA: A Platform and Programming Language Independent Interface for Search Algorithms
This paper introduces an interface specification (PISA) that allows to separate the problem-specific part of an optimizer from the problem-independent part. We propose a view of ...
Stefan Bleuler, Marco Laumanns, Lothar Thiele, Eck...
121
Voted
ESORICS
2003
Springer
15 years 9 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
GW
2003
Springer
146views Biometrics» more  GW 2003»
15 years 9 months ago
Analysis of Expressive Gesture: The EyesWeb Expressive Gesture Processing Library
This paper presents some results of a research work concerning algorithms and computational models for real-time analysis of expressive gesture in full-body human movement. As a ma...
Antonio Camurri, Barbara Mazzarino, Gualtiero Volp...