Sciweavers

466 search results - page 50 / 94
» Critical Reasoning
Sort
View
TPHOL
2009
IEEE
14 years 3 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
DEPCOS
2008
IEEE
180views Hardware» more  DEPCOS 2008»
14 years 3 months ago
A Resilient SIL 2 Driver Machine Interface for Train Control Systems
In railway train-borne equipment, the Driver Machine Interface (DMI) acts like a bridge between the train driver and the onboard automatic train control system (European Vital Com...
Andrea Ceccarelli, István Majzik, Danilo Io...
FCCM
2008
IEEE
162views VLSI» more  FCCM 2008»
14 years 3 months ago
Multiobjective Optimization of FPGA-Based Medical Image Registration
With a multitude of technological innovations, one emerging trend in image processing, and medical image processing, in particular, is custom hardware implementation of computatio...
Omkar Dandekar, William Plishker, Shuvra S. Bhatta...
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 3 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour