Sciweavers

1005 search results - page 126 / 201
» Patterns for Refinement Automation
Sort
View
IH
1999
Springer
14 years 2 days ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
ICDAR
1997
IEEE
14 years 1 days ago
Modeling Documents for Structure Recognition Using Generalized N-Grams
In this paper we present and discuss a novel approach to modeling logical structures of documents, based on a statistical representation of patterns in a document class. An effic...
Rolf Brugger, Abdel Wahab Zramdini, Rolf Ingold
ENTCS
2006
93views more  ENTCS 2006»
13 years 7 months ago
A Rule-based System for Web site Verification
In this paper, we describe a system, written in Haskell, for the automated verification of Web sites which can be used to specify (partial) correctness and completeness properties...
Demis Ballis, Javier García-Vivó
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 6 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
CADE
2005
Springer
14 years 8 months ago
Proof Planning for First-Order Temporal Logic
Proof planning is an automated reasoning technique which improves proof search by raising it to a meta-level. In this paper we apply proof planning to First-Order Linear Temporal L...
Claudio Castellini, Alan Smaill