Sciweavers

1466 search results - page 241 / 294
» Completeness of the Authentication Tests
Sort
View
DSN
2004
IEEE
13 years 11 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ERCIMDL
2006
Springer
183views Education» more  ERCIMDL 2006»
13 years 11 months ago
Design of a Cross-Media Indexing System
There is a lack of an integrated technology that will increase effective usage of the vast and heterogeneous multi-lingual and multimedia digital content. The need is being express...
Murat Yakici, Fabio Crestani
FMICS
2006
Springer
13 years 11 months ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
ATAL
2008
Springer
13 years 9 months ago
An embodied conversational agent as a lifestyle advisor
Persistent Embodied Conversational Agents (ECA) can be used to assist users in their daily activities. We introduce the Health and Fitness Companion (HFC), which is a conversation...
Cameron Smith, Daniel Charlton, Li Zhang, Marc Cav...
AIPS
2003
13 years 9 months ago
Decision-Theoretic Group Elevator Scheduling
We present an efficient algorithm for exact calculation and minimization of expected waiting times of all passengers using a bank of elevators. The dynamics of the system are rep...
Daniel Nikovski, Matthew Brand