Sciweavers

3555 search results - page 612 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
119
Voted
WWW
2001
ACM
16 years 2 months ago
ViBE: virtual biology experiments
The virtual laboratories enhance learning experiences by providing the student with a supplement to the physical lab. The laboratories allow students to perform exercises as in an...
Rajaram Subramanian, Ivan Marsic
CVPR
1998
IEEE
16 years 3 months ago
Incorporating Illumination Constraints in Deformable Models
In this paper we present a method for the integration of nonlinear holonomic constraints in deformable models and its application to the problems of shape and illuminant direction...
Dimitris Samaras, Dimitris N. Metaxas
ICSE
2008
IEEE-ACM
16 years 2 months ago
ARTOO: adaptive random testing for object-oriented software
Intuition is often not a good guide to know which testing strategies will work best. There is no substitute for experimental analysis based on objective criteria: how many bugs a ...
Ilinca Ciupa, Andreas Leitner, Manuel Oriol, Bertr...
COMPSAC
2009
IEEE
15 years 8 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay