Sciweavers

3951 search results - page 35 / 791
» Automatic amortized analysis
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 3 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
ISCI
2008
129views more  ISCI 2008»
13 years 9 months ago
Thai spelling analysis for automatic spelling speech recognition
Spelling speech recognition can be applied for several purposes including enhancement of speech recognition systems and implementation of name retrieval systems. This paper presen...
Chutima Pisarn, Thanaruk Theeramunkong
IJSEKE
2006
138views more  IJSEKE 2006»
13 years 9 months ago
Towards Automatic Establishment of Model Dependencies Using Formal Concept Analysis
tion and alteration of software models at different levels of abstraction. These modifications are usually performed independently, but the objects to which they are applied to, ar...
Igor Ivkovic, Kostas Kontogiannis
HF
2007
131views more  HF 2007»
13 years 9 months ago
Formal Analysis and Automatic Generation of User Interfaces: Approach, Methodology, and an Algorithm
In this paper we propose a formal approach and methodology for analysis and generation of human-machine interfaces, with special emphasis on human-automation interaction. Our appr...
Michael Heymann, Asaf Degani
CCS
2007
ACM
14 years 3 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...