Sciweavers

819 search results - page 74 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
114
Voted
IPPS
2003
IEEE
15 years 8 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
CIKM
2009
Springer
15 years 9 months ago
A signal-to-noise approach to score normalization
Score normalization is indispensable in distributed retrieval and fusion or meta-search where merging of result-lists is required. Distributional approaches to score normalization...
Avi T. Arampatzis, Jaap Kamps
AVSS
2006
IEEE
15 years 8 months ago
On the Performance and Use of Speaker Recognition Systems for Surveillance
We model the performance of a speaker recognition system used for surveillance to prioritize a large number of candidate speakers in search of a single target speaker. It is assum...
Peter J. Barger, Sridha Sridharan
121
Voted
CCS
2004
ACM
15 years 8 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
114
Voted
ISPA
2005
Springer
15 years 8 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng