Sciweavers

3021 search results - page 566 / 605
» A Domain Engineering Approach for Situational Method Enginee...
Sort
View
152
Voted
VMCAI
2010
Springer
15 years 10 months ago
Regular Linear Temporal Logic with Past
This paper upgrades Regular Linear Temporal Logic (RLTL) with past operators and complementation. RLTL is a temporal logic that extends the expressive power of linear temporal logi...
César Sánchez, Martin Leucker
123
Voted
DRM
2007
Springer
15 years 9 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
127
Voted
ACSC
2006
IEEE
15 years 9 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
147
Voted
EUROMICRO
2006
IEEE
15 years 9 months ago
A Modeling Paradigm for Integrated Modular Avionics Design
This paper presents the modeling paradigm for Integrated Modular Avionics Design MIMAD V0, which is an extensible component-oriented framework that enables high level models of sy...
Abdoulaye Gamatié, Christian Brunette, Roma...
120
Voted
SEW
2006
IEEE
15 years 9 months ago
Model Checking of Software Components: Combining Java PathFinder and Behavior Protocol Model Checker
Although there exist several software model checkers that check the code against properties specified e.g. via a temporal logic and assertions, or just verifying low-level propert...
Pavel Parizek, Frantisek Plasil, Jan Kofron