Sciweavers

537 search results - page 78 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
KBSE
2010
IEEE
13 years 6 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
SEFM
2005
IEEE
14 years 1 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
WWW
2006
ACM
14 years 8 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...
USS
2008
13 years 10 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
SPEECH
2010
154views more  SPEECH 2010»
13 years 2 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...