Sciweavers

5525 search results - page 200 / 1105
» Verification of Model Transformations
Sort
View
128
Voted
ENTCS
2008
88views more  ENTCS 2008»
15 years 3 months ago
Formal Modelling of Salience and Cognitive Load
Well-designed interfaces use procedural and sensory cues to increase the salience of appropriate actions and intentions. However, empirical studies suggest that cognitive load can...
Rimvydas Ruksenas, Jonathan Back, Paul Curzon, Ann...
156
Voted
IJNSEC
2008
190views more  IJNSEC 2008»
15 years 3 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
129
Voted
JCP
2008
142views more  JCP 2008»
15 years 3 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
162
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Recent progress in prosodic speaker verification
We describe recent progress in the field of prosodic modeling for speaker verification. In a previous paper, we proposed a technique for modeling syllable-based prosodic feature...
Marcel Kockmann, Luciana Ferrer, Lukas Burget, Eli...
133
Voted
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 9 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton