Sciweavers

871 search results - page 51 / 175
» How Realistic is Realism
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto
VSTTE
2005
Springer
14 years 1 months ago
Toasters, Seat Belts, and Inferring Program Properties
Today’s software does not come with meaningful guarantees. This position paper explores why this is the case, suggests societal and technical impediments to more dependable softw...
David Evans
LANMR
2004
13 years 9 months ago
Reasoning about Lava effusion: From Geographical Information Systems to Answer Set Programming
Abstract. This article describes our implementation in Answer Set Programming of a reasoning system that models the flow of lava in volcanic eruptions. Our system can be employed i...
Isabella Cattinelli, Maria Luisa Damiani, Andrea N...
ICIP
2000
IEEE
14 years 9 months ago
Towards an Optimal Television Display Format
The techniques for video format conversion recently have reached a maturity, where they no longer prohibit application in the consumer domain because of high price or clear pictur...
Erwin B. Bellers, Gerard de Haan
INFOCOM
2008
IEEE
14 years 2 months ago
The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks
—Underwater mobile acoustic sensor networks are promising tools for the exploration of the oceans. These networks require new robust solutions for fundamental issues such as: loc...
Antonio Caruso, Francesco Paparella, Luiz Filipe M...