Sciweavers

10715 search results - page 13 / 2143
» Proofs from Tests
Sort
View
TCS
2002
13 years 8 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
ICSE
2010
IEEE-ACM
14 years 1 months ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the forme...
Friedrich Steimann, Andreas Thies
ECCC
2010
117views more  ECCC 2010»
13 years 7 months ago
Nearly Tight Bounds for Testing Function Isomorphism
We study the problem of testing isomorphism (equivalence up to relabelling of the variables) of two Boolean functions f, g : {0, 1}n → {0, 1}. Our main focus is on the most stud...
Sourav Chakraborty, David García-Soriano, A...
ICIP
2007
IEEE
14 years 10 months ago
Sound from Gramophone Record Groove Surface Orientation
Preserving historic recording on gramophone records is an important task because the traditional record play back system damages/wears out records eventually. We present an optica...
Baozhong Tian, John L. Barron
CSFW
2002
IEEE
14 years 2 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman