Sciweavers

700 search results - page 29 / 140
» Combinations of Stit and Actions
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CVPR
2007
IEEE
14 years 9 months ago
A Human Action Recognition System for Embedded Computer Vision Application
In this paper, we propose a human action recognition system suitable for embedded computer vision applications in security systems, human-computer interaction and intelligent envi...
Hongying Meng, Nick Pears, Chris Bailey
FMICS
2007
Springer
14 years 1 months ago
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications
Abstract. In this paper we present an action/state-based logical framework for the analysis and verification of complex systems, which relies on the definition of doubly labelled...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...
ACMDIS
2008
ACM
13 years 9 months ago
Supporting cooperative teamwork: information, action and communication in sailing
This paper provides details of an in-depth investigation into how racing sailors use information displays and devices, and shows that these devices act as communication loci and i...
Russell Beale
LWA
2007
13 years 9 months ago
Prediction Algorithms for User Actions
Proactive User Interfaces (PUIs) aim at facilitating the interaction with a user interface, e.g., by highlighting fields or adapting the interface. For that purpose, they need to...
Melanie Hartmann, Daniel Schreiber