Sciweavers

2513 search results - page 382 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ICSE
2007
IEEE-ACM
15 years 10 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
COMSWARE
2008
IEEE
15 years 4 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
PDP
2007
IEEE
15 years 4 months ago
Automated Deployment Support for Parallel Distributed Computing
Heterogeneous distributed computing platforms continue to require substantial effort in terms of software installation and management for efficient use, often necessitating manua...
Magdalena Slawiñska, Dawid Kurzyniec, Jaros...
B
2007
Springer
15 years 4 months ago
Symmetry Reduction for B by Permutation Flooding
Symmetry reduction is an established method for limiting the amount of states that have to be checked during exhaustive model checking. The idea is to only verify a single represen...
Michael Leuschel, Michael J. Butler, Corinna Sperm...
CISSE
2007
Springer
15 years 4 months ago
Intuitive Interface for the Exploration of Volumetric Datasets
Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a crosssectional plane thr...
Rahul Sarkar, Chrishnika de Almeida, Noureen Syed,...