Sciweavers

323 search results - page 29 / 65
» Verifying the Mondex Case Study
Sort
View
JALC
2006
87views more  JALC 2006»
15 years 1 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
141
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 7 days ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
152
Voted
TMC
2012
13 years 4 months ago
Mobile Data Offloading through Opportunistic Communications and Social Participation
—3G networks are currently overloaded, due to the increasing popularity of various applications for smartphones. Offloading mobile data traffic through opportunistic communicatio...
Bo Han, Pan Hui, V. S. Anil Kumar, Madhav V. Marat...
ASE
2002
160views more  ASE 2002»
15 years 1 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
105
Voted
ICPR
2006
IEEE
16 years 3 months ago
Gaussian mixture pdf in one-class classification: computing and utilizing confidence values
In this study a confidence measure for probability density functions (pdfs) is presented. The measure can be used in one-class classification to select a pdf threshold for class i...
Jarmo Ilonen, Pekka Paalanen, Joni-Kristian Kamara...