Sciweavers

1528 search results - page 105 / 306
» Performance Assertion Checking
Sort
View
NCA
2009
IEEE
14 years 4 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal
GBRPR
2005
Springer
14 years 3 months ago
Adaptive Pyramid and Semantic Graph: Knowledge Driven Segmentation
A method allowing to integrate syntactic and semantic approaches in an automatic segmentation process is described. This integration is possible thanks to the formalism of graphs....
Aline Deruyver, Yann Hodé, Eric Laemmer, Je...
ISW
2001
Springer
14 years 2 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?â€...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
FMSD
2006
119views more  FMSD 2006»
13 years 10 months ago
Feature interaction detection by pairwise analysis of LTL properties - A case study
A Promela specification and a set of temporal properties are developed for a basic call service with a number of features. The properties are expressed in the logic LTL. Interactio...
Muffy Calder, Alice Miller
TCAD
2008
181views more  TCAD 2008»
13 years 10 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...