Sciweavers

1792 search results - page 139 / 359
» e-Participation and Decision Analysis
Sort
View
FROCOS
2007
Springer
15 years 5 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
ICB
2007
Springer
134views Biometrics» more  ICB 2007»
15 years 5 months ago
Singular Points Analysis in Fingerprints Based on Topological Structure and Orientation Field
Abstract. As an important feature of fingerprints, singular points (includingcores and deltas) not only represent the local ridge pattern characteristics, but also determine the to...
Jie Zhou, Jinwei Gu, David Zhang
ICCBR
2007
Springer
15 years 5 months ago
Failure Analysis for Domain Knowledge Acquisition in a Knowledge-Intensive CBR System
A knowledge-intensive case-based reasoning system has profit of the domain knowledge, together with the case base. Therefore, acquiring new pieces of domain knowledge should impro...
Amélie Cordier, Béatrice Fuchs, Jean...
83
Voted
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
15 years 5 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 5 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...