Sciweavers

2702 search results - page 184 / 541
» Practically Applicable Formal Methods
Sort
View
IWFM
2003
15 years 6 days ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
COMPGEOM
1997
ACM
15 years 3 months ago
A Wavelet Approach to Foveating Images
Motivated by applications of foveated images in visualization, we introduce the foveation transform of an image. We study the basic properties of these transforms using the multir...
Ee-Chien Chang, Chee-Keng Yap
CORR
2010
Springer
119views Education» more  CORR 2010»
14 years 8 months ago
Using Information Theory to Study the Efficiency and Capacity of Computers and Similar Devices
We address the problems of estimating the computer efficiency and the computer capacity. We define the computer efficiency and capacity and suggest a method for their estimation, ...
Boris Ryabko
79
Voted
QSIC
2009
IEEE
15 years 5 months ago
From UML Statecharts to LOTOS: A Semantics Preserving Model Transformation
—A well-founded testing theory encourages the practical application of test case generation techniques. This aims at overcoming the ever increasing complexity of softwareenabled ...
Valentin Chimisliu, Christian Schwarzl, Bernhard P...
93
Voted
JMLR
2008
117views more  JMLR 2008»
14 years 10 months ago
Closed Sets for Labeled Data
Closed sets have been proven successful in the context of compacted data representation for association rule learning. However, their use is mainly descriptive, dealing only with ...
Gemma C. Garriga, Petra Kralj, Nada Lavrac