Sciweavers

123 search results - page 17 / 25
» A case study on the automated verification of groupware prot...
Sort
View
PAMI
2006
186views more  PAMI 2006»
13 years 7 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
HYBRID
1998
Springer
13 years 11 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
CADE
2005
Springer
14 years 7 months ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
ITNG
2010
IEEE
14 years 15 days ago
BAUT: A Bayesian Driven Tutoring System
—This paper presents the design of BAUT, a tutoring system that explores statistical approach for providing instant project failure analysis. Driven by a Bayesian Network (BN) in...
Song Tan, Kai Qian, Xiang Fu, Prabir Bhattacharya
CCR
2011
13 years 2 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer