Sciweavers

1256 search results - page 107 / 252
» Modeling operator performance for error analysis
Sort
View
FC
2010
Springer
226views Cryptology» more  FC 2010»
14 years 11 days ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena
TCAD
2008
181views more  TCAD 2008»
13 years 9 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...
AISS
2010
147views more  AISS 2010»
13 years 6 months ago
Correlating Lattice Constant of Cubic Perovskites to Atomic Parameters Using Support Vector Regression
Recently, due to problems arising from lattice mismatch in thin film growth in semiconductor manufacturing industry, researchers have shown great interest in modeling the physioch...
Abdul Majid, Yeon Soo Lee
ISSTA
2009
ACM
14 years 3 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 3 months ago
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment
—In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effe...
Mohammed W. Baidas, Ahmed S. Ibrahim, Karim G. Sed...