Sciweavers

1466 search results - page 59 / 294
» Completeness of the Authentication Tests
Sort
View
APN
2008
Springer
13 years 10 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
ESORICS
2010
Springer
13 years 9 months ago
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
KDD
2002
ACM
108views Data Mining» more  KDD 2002»
14 years 8 months ago
Incremental Machine Learning to Reduce Biochemistry Lab Costs in the Search for Drug Discovery
This paper promotes the use of supervised machine learning in laboratory settings where chemists have a large number of samples to test for some property, and are interested in id...
George Forman
ICIP
2000
IEEE
14 years 21 days ago
Adaptive Target Detection Across a Clutter Boundary: GLR and Maximally Invariant Detectors
We present and compare adaptive detection algorithms developed for synthetic aperture radar (SAR) targets in structured clutter, utilizing both generalized likelihood ratio (GLR) ...
Hyung Soo Kim, Alfred O. Hero III
DATE
2009
IEEE
106views Hardware» more  DATE 2009»
14 years 3 months ago
Generation of compact test sets with high defect coverage
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
Xrysovalantis Kavousianos, Krishnendu Chakrabarty