Sciweavers

5525 search results - page 89 / 1105
» Verification of Model Transformations
Sort
View
MODELS
2007
Springer
15 years 4 months ago
Reconciling TGGs with QVT
ant Talks Abstracts Modelling Tools: Claudia Ermel: Tiger Harmen Kastenberg: GROOVE Christian Köhler: EMF Model Transformation Ákos Horváth: The VIATRA2 Model Transformation Fra...
Joel Greenyer, Ekkart Kindler
ICASSP
2009
IEEE
15 years 4 months ago
Humming-based human verification and identification
This paper considers humming-based human verification and identification systems. Humming of a target person is modeled as a Gaussian mixture model, and the matching score betwe...
Minho Jin, Jaewook Kim, Chang D. Yoo
ESORICS
2000
Springer
15 years 1 months ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 4 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
FLAIRS
2006
14 years 11 months ago
Formal Verification of Cognitive Models
Cognitive modeling has outgrown the toy problems of the research labs and is increasingly tackling Industrial size applications. This growth is not matched in terms of software to...
A. MacKlem, Fatma Mili