Sciweavers

2523 search results - page 328 / 505
» Correct Development of Embedded Systems
Sort
View
SRDS
1993
IEEE
15 years 6 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
SSPR
2000
Springer
15 years 5 months ago
Selection of Classifiers Based on Multiple Classifier Behaviour
In the field of pattern recognition, the concept of Multiple Classifier Systems (MCSs) was proposed as a method for the development of high performance classification systems. At p...
Giorgio Giacinto, Fabio Roli, Giorgio Fumera
125
Voted
FORTEST
2008
15 years 3 months ago
From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria
This paper describes an approach to the formalization of existing criteria used in computer systems software testing and proposes a new Reinforced Condition/Decision Coverage (RC/D...
Sergiy A. Vilkomir, Jonathan P. Bowen
CSREAEEE
2006
129views Business» more  CSREAEEE 2006»
15 years 3 months ago
Computer Science Exercises in a Virtual University
Abstract--In distance teaching, direct feedback to the students is difficult to give, but crucial for their learning success. The system Asterix was developed in order to support t...
Manfred Widera, Barbara Messing, Gabriele Kern-Isb...
85
Voted
COLING
1992
15 years 3 months ago
Broad Coverage Automatic Morphological Segmentation of German Words
A system for the automatic segmentation of German words into morphs was developed. The main linguistic knowledge sources used by the system are a word syntax and a morph dictionar...
T. Pachunke, O. Mertineit, Klaus Wothke, Rudolf Sc...