Sciweavers

4693 search results - page 66 / 939
» Verifying Hybrid Systems
Sort
View
FASE
2010
Springer
14 years 10 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
113
Voted
GECCO
2004
Springer
15 years 6 months ago
Program Evolution by Integrating EDP and GP
This paper discusses the performance of a hybrid system which consists of EDP and GP. EDP, Estimation of Distribution Programming, is the program evolution method based on the prob...
Kohsuke Yanai, Hitoshi Iba
92
Voted
ICDAR
2003
IEEE
15 years 5 months ago
An HMM On-line Signature Verifier Incorporating Signature Trajectories
Authentication of individuals is rapidly becoming an important issue. On-line signature verification is one of the methods that use biometric features. This paper proposes a new H...
Daigo Muramatsu, Takashi Matsumoto
93
Voted
APSEC
1998
IEEE
15 years 4 months ago
Verifying Model Oriented Specifications through Animation
In this paper we demonstrate how light weight tools can be used to increase the level of confidence in Z specifications. In particular we outline the Pipedream approach to explori...
Edmund Kazmierczak, Michael Winikoff, Philip W. Da...
118
Voted
POPL
2000
ACM
15 years 4 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith