Sciweavers

1011 search results - page 110 / 203
» Exception Analysis for Java
Sort
View
ICICS
2010
Springer
13 years 8 months ago
Proving Coercion-Resistance of Scantegrity II
By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resistance to vote buying and voter coercion. Scantegrity II...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
ICEIS
2009
IEEE
13 years 8 months ago
Mining Patterns in the Presence of Domain Knowledge
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
Cláudia Antunes
ICSE
2004
IEEE-ACM
14 years 10 months ago
Heuristic-Based Model Refinement for FLAVERS
FLAVERS is a finite-state verification approach that allows an analyst to incrementally add constraints to improve the precision of the model of the system being analyzed. Except ...
Jianbin Tan, George S. Avrunin, Lori A. Clarke
ACSAC
2008
IEEE
14 years 4 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...
ICIP
2008
IEEE
14 years 4 months ago
Incorporating known features into a total variation dictionary model for source separation
The goal of this paper is to investigate the impact of dictionary choosing for a total variation dictionary model. After theoretical analysis, we present the experiments in which ...
Tieyong Zeng