Sciweavers

480 search results - page 87 / 96
» On the verification of automotive protocols
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
PADL
2009
Springer
14 years 8 months ago
Operational Semantics for Declarative Networking
Declarative Networking has been recently promoted as a high-level programming paradigm to more conveniently describe and implement systems that run in a distributed fashion over a ...
Juan A. Navarro, Andrey Rybalchenko
MOBIHOC
2002
ACM
14 years 7 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...
RTA
2009
Springer
14 years 1 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
ICCV
2007
IEEE
14 years 1 months ago
Hierarchical Ensemble of Global and Local Classifiers for Face Recognition
In the literature of psychophysics and neurophysiology, many studies have shown that both global and local features are crucial for face representation and recognition. This paper...
Yu Su, Shiguang Shan, Xilin Chen, Wen Gao