Sciweavers

687 search results - page 23 / 138
» Oracle real application testing
Sort
View
116
Voted
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 6 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
VTC
2008
IEEE
15 years 6 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
116
Voted
IJCAI
2007
15 years 1 months ago
Fault-Model-Based Test Generation for Embedded Software
Testing embedded software systems on the control units of vehicles is a safety-relevant task, and developing the test suites for performing the tests on test benches is time-consu...
Michael Esser, Peter Struss
AVSS
2003
IEEE
15 years 5 months ago
Color-Based Video Stabilization for Real-Time On-Board Object Detection on High-Speed Trains
This paper is concerned with a particular application of image stabilization1 . Image stabilization is a necessary step to reduce the effect of camera motion when, as in this case...
Stefano Piva, Michela Zara, Gianluca Gera, Carlo S...
85
Voted
DAC
2001
ACM
16 years 1 months ago
Semi-Formal Test Generation with Genevieve
This paper describes the first application of the Genevieve test generation methodology. The Genevieve approach uses semi-formal techniques derived from "model-checking"...
Julia Dushina, Mike Benjamin, Daniel Geist