Sciweavers

2043 search results - page 142 / 409
» Reasoning About Security Models
Sort
View
AMR
2003
Springer
179views Multimedia» more  AMR 2003»
15 years 6 months ago
Building User Models from Observations of Users Accessing Multimedia Learning Objects
Abstract. We report our work towards building user models of learner’s development based upon evidence of their interactions with an e-learning website composed of multimedia lea...
Judy Kay, Andrew Lum
ICSE
2007
IEEE-ACM
16 years 26 days ago
Formal Software Analysis Emerging Trends in Software Model Checking
The study of methodologies and techniques to produce correct software has been active for four decades. During this period, researchers have developed and investigated a wide vari...
Matthew B. Dwyer, John Hatcliff, Robby, Corina S. ...
DEBU
2006
163views more  DEBU 2006»
15 years 24 days ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...
ESORICS
2009
Springer
16 years 1 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 7 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...