Sciweavers

602 search results - page 25 / 121
» Efficient Model Checking of Applications with Input Output
Sort
View
ACSC
2007
IEEE
13 years 11 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ESANN
2004
13 years 9 months ago
Dynamic functional-link neural networks genetically evolved applied to system identification
: The contribution concerns the design of a generalised functional-link neural network with internal dynamics and its applicability to system identification by means of multi-input...
Teodor Marcu, Birgit Köppen-Seliger
CAV
2006
Springer
101views Hardware» more  CAV 2006»
13 years 11 months ago
Ticc: A Tool for Interface Compatibility and Composition
Abstract. We present a brief overview of the tool Ticc (Tool for Interface Compatibility and Composition). In Ticc, a component interface describes both the behavior of a component...
B. Thomas Adler, Luca de Alfaro, Leandro Dias da S...
CVPR
2007
IEEE
14 years 9 months ago
On the Blind Classification of Time Series
We propose a cord distance in the space of dynamical models that takes into account their dynamics, including transients, output maps and input distributions. In data analysis app...
Alessandro Bissacco, Stefano Soatto
KBSE
1998
IEEE
13 years 12 months ago
Towards the Automated Debugging and Maintenance of Logic-based Requirements Models
In this paper we describe a tools environment which automates the validation and maintenance of a requirements model written in many-sorted first order logic. We focus on: a trans...
T. L. McCluskey, Margaret Mary West