Sciweavers

687 search results - page 23 / 138
» Oracle real application testing
Sort
View
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 4 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
VTC
2008
IEEE
14 years 4 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
IJCAI
2007
13 years 11 months ago
Fault-Model-Based Test Generation for Embedded Software
Testing embedded software systems on the control units of vehicles is a safety-relevant task, and developing the test suites for performing the tests on test benches is time-consu...
Michael Esser, Peter Struss
AVSS
2003
IEEE
14 years 3 months ago
Color-Based Video Stabilization for Real-Time On-Board Object Detection on High-Speed Trains
This paper is concerned with a particular application of image stabilization1 . Image stabilization is a necessary step to reduce the effect of camera motion when, as in this case...
Stefano Piva, Michela Zara, Gianluca Gera, Carlo S...
DAC
2001
ACM
14 years 11 months ago
Semi-Formal Test Generation with Genevieve
This paper describes the first application of the Genevieve test generation methodology. The Genevieve approach uses semi-formal techniques derived from "model-checking"...
Julia Dushina, Mike Benjamin, Daniel Geist