Sciweavers

1497 search results - page 231 / 300
» Extended static checking
Sort
View
AMC
2005
138views more  AMC 2005»
13 years 8 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
TII
2008
98views more  TII 2008»
13 years 8 months ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux
DGCI
2005
Springer
14 years 2 months ago
Algorithms for the Topological Watershed
The watershed transformation is an efficient tool for segmenting grayscale images. An original approach to the watershed [1,9] consists in modifying the original image by lowering...
Michel Couprie, Laurent Najman, Gilles Bertrand
PVLDB
2008
117views more  PVLDB 2008»
13 years 7 months ago
Interactive source registration in community-oriented information integration
Modern Internet communities need to integrate and query structured information. Employing current information integration infrastructure, data integration is still a very costly e...
Yannis Katsis, Alin Deutsch, Yannis Papakonstantin...
JAPLL
2010
104views more  JAPLL 2010»
13 years 7 months ago
Group announcement logic
Two currently active strands of research on logics for multi-agent systems are dynamic epistemic logic, focusing on the epistemic consequences of actions, and logics of coalitiona...
Thomas Ågotnes, Philippe Balbiani, Hans P. v...