Sciweavers

13383 search results - page 2320 / 2677
» Abstractions from proofs
Sort
View
CADE
2011
Springer
14 years 4 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CAIP
2011
Springer
248views Image Analysis» more  CAIP 2011»
14 years 4 months ago
Statistical Tuning of Adaptive-Weight Depth Map Algorithm
Abstract. In depth map generation, the settings of the algorithm parameters to yield an accurate disparity estimation are usually chosen empirically or based on unplanned experimen...
Alejandro Hoyos, John Congote, Iñigo Barand...
CIARP
2011
Springer
14 years 4 months ago
A Minority Class Feature Selection Method
Abstract. In many classification problems, and in particular in medical domains, it is common to have an unbalanced class distribution. This pose problems to classifiers as they ...
German Cuaya, Angélica Muñoz-Mel&eac...
CMS
2011
229views Communications» more  CMS 2011»
14 years 4 months ago
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure ...
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sa...
COMPSAC
2011
IEEE
14 years 4 months ago
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Abstract—Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such ...
Zhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang
« Prev « First page 2320 / 2677 Last » Next »