Sciweavers

30 search results - page 6 / 6
» Trio2Promela: A Model Checker for Temporal Metric Specificat...
Sort
View
91
Voted
ICSE
2008
IEEE-ACM
15 years 10 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICMCS
2008
IEEE
156views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Human attention model for semantic scene analysis in movies
In this paper, we specifically propose the Weber-Fechner Law-based human attention model for semantic scene analysis in movies. Different from traditional video processing techniq...
Anan Liu, Yongdong Zhang, Yan Song, Dongming Zhang...
87
Voted
AOSD
2009
ACM
15 years 20 days ago
Modular verification of dynamically adaptive systems
Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
Ji Zhang, Heather Goldsby, Betty H. C. Cheng
88
Voted
CCS
2008
ACM
15 years 7 days ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
111
Voted
PERCOM
2007
ACM
15 years 9 months ago
Context Aware Routing of Enterprise User Communications
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...