Sciweavers

ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 9 days ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
CODES
2007
IEEE
14 years 14 days ago
Combined approach to system level performance analysis of embedded systems
Compositional approaches to system-level performance analysis have shown great flexibility and scalability in the design of heterogeneous systems. These approaches often assume c...
Simon Künzli, Arne Hamann, Rolf Ernst, Lothar...
SCAM
2008
IEEE
14 years 15 days ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
IAT
2008
IEEE
14 years 17 days ago
An Analysis of Entries in the First TAC Market Design Competition
This paper presents an analysis of entries in the first TAC Market Design Competition that compares the entries across several scenarios. The analysis complements previous work a...
Jinzhong Niu, Kai Cai, Peter McBurney, Simon Parso...
AVSS
2008
IEEE
14 years 18 days ago
Automatic Detection of Adverse Weather Conditions in Traffic Scenes
Visual surveillance in outdoor environments requires the monitoring of both objects and events. The analysis is generally driven by the target application which, in turn, determin...
Andrea Lagorio, Enrico Grosso, Massimo Tistarelli
ICISS
2009
Springer
14 years 21 days ago
A Framework for Behavior-Based Malware Analysis in the Cloud
Abstract. To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been proposed in the literature. Unfortunately, these techniques often give...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
WIAMIS
2009
IEEE
14 years 26 days ago
Full action instances for motion analysis
Motion analysis is an important component of surveillance, video annotation and many other applications. Current work focuses on the tracking of moving entities, the representatio...
Stergios Poularakis, Alexia Briassouli, Ioannis Ko...
WWW
2009
ACM
14 years 28 days ago
Near real time information mining in multilingual news
This paper presents a near real-time multilingual news monitoring and analysis system that forms the backbone of our research work. The system integrates technologies to address t...
Martin Atkinson, Erik Van der Goot
HICSS
2009
IEEE
178views Biometrics» more  HICSS 2009»
14 years 28 days ago
Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless Network
As technology develops, local governments are increasingly becoming involved in providing municipal wireless service. However, many obstacles exist in municipal wireless provision...
Myungjae Kwak, Thomas A. Horan, Hana Oh
CVPR
2010
IEEE
14 years 2 months ago
Probabilistic 3D Occupancy Flow with Latent Silhouette Cues
In this paper we investigate shape and motion retrieval in the context of multi-camera systems. We propose a new lowlevel analysis based on latent silhouette cues, particularly su...
Li Guan, Jean-Sebastien Franco, Edmond Boyer, Marc...