Sciweavers

1396 search results - page 24 / 280
» aim 2006
Sort
View
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ECTEL
2006
Springer
15 years 1 months ago
A Framework for Building Virtual Communities for Education
The aim of education is to provide the basis for life long learning and improvement. In this direction, schools and universities offer standard curricula aiming to cover the fundam...
Iraklis Varlamis, Ioannis Apostolakis
IIHMSP
2006
IEEE
126views Multimedia» more  IIHMSP 2006»
15 years 3 months ago
Extending the Selective MPEG Encryption Algorithm PVEA
Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising can...
Li Weng, Karel Wouters, Bart Preneel
FMCO
2006
Springer
103views Formal Methods» more  FMCO 2006»
15 years 1 months ago
Verifying Object-Oriented Programs with KeY: A Tutorial
This paper is a tutorial on performing formal specification and semi-automatic verification of Java programs with the formal software development tool KeY. This tutorial aims to fi...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
68
Voted
IJHPCA
2006
125views more  IJHPCA 2006»
14 years 9 months ago
Complexity Results for Collective Communications on Heterogeneous Platforms
In this paper, we consider the communications involved in the execution of a complex application, deployed on a heterogeneous platform. Such applications extensively use macro-com...
Olivier Beaumont, Loris Marchal, Yves Robert