Sciweavers

451 search results - page 46 / 91
» Relationless Completeness and Separations
Sort
View
IWSEC
2010
Springer
14 years 8 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
COMPSAC
2010
IEEE
14 years 7 months ago
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The streambased services util...
Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil ...
SIGSOFT
2010
ACM
14 years 7 months ago
Future of developer testing: building quality in code
Although much progress has been made in software verification, software testing remains by far the most widely used technique for improving software reliability. Among various typ...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...
SIGSOFT
2010
ACM
14 years 7 months ago
Staged concurrent program analysis
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Nishant Sinha, Chao Wang
ICCV
2009
IEEE
14 years 7 months ago
Component analysis approach to estimation of tissue intensity distributions of 3D images
Many segmentation problems in medical imaging rely on accurate modeling and estimation of tissue intensity probability density functions. Gaussian mixture modeling, currently the ...
Arridhana Ciptadi, Cheng Chen, Vitali Zagorodnov