Sciweavers

819 search results - page 74 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
IPPS
2003
IEEE
15 years 10 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
CIKM
2009
Springer
15 years 11 months ago
A signal-to-noise approach to score normalization
Score normalization is indispensable in distributed retrieval and fusion or meta-search where merging of result-lists is required. Distributional approaches to score normalization...
Avi T. Arampatzis, Jaap Kamps
AVSS
2006
IEEE
15 years 11 months ago
On the Performance and Use of Speaker Recognition Systems for Surveillance
We model the performance of a speaker recognition system used for surveillance to prioritize a large number of candidate speakers in search of a single target speaker. It is assum...
Peter J. Barger, Sridha Sridharan
CCS
2004
ACM
15 years 10 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ISPA
2005
Springer
15 years 10 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng