Sciweavers

1297 search results - page 150 / 260
» fews 2007
Sort
View
ATVA
2007
Springer
108views Hardware» more  ATVA 2007»
15 years 4 months ago
A New Approach to Bounded Model Checking for Branching Time Logics
Abstract. Bounded model checking (BMC) is a technique for overcoming the state explosion problem which has gained wide industrial acceptance. Bounded model checking is typically ap...
Rotem Oshman, Orna Grumberg
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
15 years 4 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
BIRTHDAY
2007
Springer
15 years 4 months ago
Models and Software Model Checking of a Distributed File Replication System
With the Distributed File System Replication component, DFS-R, as the central theme, we present selected protocol problems and validation methods encountered during design and deve...
Nikolaj Bjørner
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 4 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
CIARP
2007
Springer
15 years 4 months ago
Multi-class Binary Object Categorization Using Blurred Shape Models
The main difficulty in the binary object classification field lays in dealing with a high variability of symbol appearance. Rotation, partial occlusions, elastic deformations, or...
Sergio Escalera, Alicia Fornés, Oriol Pujol...