Sciweavers

1466 search results - page 48 / 294
» Completeness of the Authentication Tests
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
GECCO
2005
Springer
163views Optimization» more  GECCO 2005»
14 years 1 months ago
Benefits of software measures for evolutionary white-box testing
White-box testing is an important method for the early detection of errors during software development. In this process test case generation plays a crucial role, defining appropr...
Frank Lammermann, Stefan Wappler
AAAI
1997
13 years 9 months ago
Applications of Rule-Base Coverage Measures to Expert System Evaluation
Often a rule-based system is tested by checking its performance on a number of test cases with known solutions, modifying the system until it gives the correct results for all or ...
Valerie Barr
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Aggregating signatures of MPEG-4 elementary streams
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Yongdong Wu
LISA
2000
13 years 9 months ago
Pelendur: Steward of the Sysadmin
Here we describe Pelendur, a system for the management of common system operation tasks. Specifically, Pelendur focuses on the management of user accounts and related information ...
Matt Curtin, Sandy Farrar, Tami King