Sciweavers

4540 search results - page 758 / 908
» Evolving the
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 5 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
TIT
2011
127views more  TIT 2011»
13 years 5 months ago
Semiunitary Precoding for Spatially Correlated MIMO Channels
— The focus of this paper is on spatial precoding in correlated multi-antenna channels where the number of datastreams is adapted independent of the number of transmit antennas. ...
Vasanthan Raghavan, Akbar M. Sayeed, Venugopal V. ...
TSE
2011
180views more  TSE 2011»
13 years 5 months ago
Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
—Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and web applications. These EDS pose a challenge to testing because there are a la...
Renée C. Bryce, Sreedevi Sampath, Atif M. M...
UAIS
2011
237views more  UAIS 2011»
13 years 5 months ago
Game accessibility: a survey
Over the last three decades, video games have evolved from a pastime into a force of change that is transforming the way people perceive, learn about, and interact with the world a...
Bei Yuan, Eelke Folmer, Frederick C. Harris
VLC
2011
83views more  VLC 2011»
13 years 5 months ago
A decision procedure for a decidable fragment of generalized constraint diagrams
Constraint diagrams were introduced by Kent, in 1997, as an alternative to the OCL for placing formal constraints on software models. Since their introduction, constraint diagrams...
Jim Burton, Gem Stapleton, Ali Hamie