Sciweavers

306 search results - page 47 / 62
» From Scenarios to Timed Automata: Building Specifications fr...
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
INFOCOM
2011
IEEE
12 years 11 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra

Publication
922views
15 years 2 months ago
Multi-Class Active Learning for Image Classification
One of the principal bottlenecks in applying learning techniques to classification problems is the large amount of labeled training data required. Especially for images and video, ...
Ajay J. Joshi, Fatih Porikli, Nikolaos Papanikolop...
CAISE
2005
Springer
14 years 1 months ago
Bridging Relational Databases to Context-Aware Services
The provision of context-aware services in terms of the anytime/anywhere/anymedia paradigm requires the consideration of certain context properties in terms of time, location, devi...
Elisabeth Kapsammer, Wieland Schwinger, Werner Ret...
ICSE
1999
IEEE-ACM
13 years 12 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith