Sciweavers

634 search results - page 74 / 127
» Groundwork for Weak Analysis
Sort
View
111
Voted
FASE
2009
Springer
15 years 10 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
144
Voted
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
15 years 10 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
125
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
143
Voted
IWPC
2005
IEEE
15 years 9 months ago
A Qualitative Comparison of Three Aspect Mining Techniques
The fact that crosscutting concerns (aspects) cannot be well modularized in object oriented software is an impediment to program comprehension: the implementation of a concern is ...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
185
Voted
SINOBIOMETRICS
2004
Springer
15 years 9 months ago
Baseline Evaluations on the CAS-PEAL-R1 Face Database
In this paper, three baseline face recognition algorithms are evaluated on the CAS-PEAL-R1 face database which is publicly released from a large-scale Chinese face database: CAS-PE...
Bo Cao, Shiguang Shan, Xiaohua Zhang, Wen Gao