Sciweavers

3420 search results - page 6 / 684
» A Language-Based Approach to Security
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
ISQED
2006
IEEE
118views Hardware» more  ISQED 2006»
14 years 1 months ago
Language-Based High Level Transaction Extraction on On-chip Buses
Abstract— With the increasing in silicon densities, SoC designs are the stream in modern electronics systems. Accordingly, the verification for SoC designs is crucial. One of th...
Yi-Le Huang, Chun-Yao Wang, Richard Yeh, Shih-Chie...
FASE
2008
Springer
13 years 9 months ago
Language-Based Optimisation of Sensor-Driven Distributed Computing Applications
In many distributed computing paradigms, especially sensor networks and ubiquitous computing but also grid computing and web services, programmers commonly tie their application to...
Jonathan J. Davies, Alastair R. Beresford, Alan My...
COLING
2008
13 years 9 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
RIAO
2000
13 years 9 months ago
Language-Based Multimedia Information Retrieval
This paper describes various methods and approaches for language-based multimedia information retrieval, which have been developed in the projects POP-EYE and OLIVE and which will...
Franciska de Jong, Jean-Luc Gauvain, Djoerd Hiemst...