Sciweavers

846 search results - page 138 / 170
» Rewrite-Based Decision Procedures
Sort
View
IPMU
2010
Springer
15 years 9 months ago
Credal Sets Approximation by Lower Probabilities: Application to Credal Networks
Abstract. Credal sets are closed convex sets of probability mass functions. The lower probabilities specified by a credal set for each element of the power set can be used as cons...
Alessandro Antonucci, Fabio Cuzzolin
169
Voted
CIARP
2009
Springer
15 years 9 months ago
Pigmented Skin Lesions Classification Using Dermatoscopic Images
In this paper we propose a machine learning approach to classify melanocytic lesions in malignant and benign from dermatoscopic images. The image database is composed of 433 benign...
Germán Capdehourat, Andrés Corez, An...
CSFW
2010
IEEE
15 years 9 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
154
Voted
CSFW
2010
IEEE
15 years 9 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
15 years 9 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...