Sciweavers

500 search results - page 40 / 100
» Quantified Conditionals and Compositionality
Sort
View
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
14 years 28 days ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
CSFW
1996
IEEE
13 years 11 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
TPPP
1994
13 years 11 months ago
Advanced Component Interface Specification
We introduce a method for the specification of reactive asynchronous components with a concurrent access interface and outline its mathematical foundation. The method supports the...
Manfred Broy
ENTCS
2010
99views more  ENTCS 2010»
13 years 7 months ago
Describing Secure Interfaces with Interface Automata
Interface automata are a model that allows for the representation of stateful interfaces. In this paper we introduce a variant of interface automata, which we call interface struc...
Matias Lee, Pedro R. D'Argenio
ICCAD
1995
IEEE
88views Hardware» more  ICCAD 1995»
13 years 11 months ago
Estimation and bounding of energy consumption in burst-mode control circuits
This paper describes two techniques to quantify energy consumption of burst-modeasynchronous(clock-less)controlcircuits. The circuit specifications consideredare extended burst-m...
Peter A. Beerel, Kenneth Y. Yun, Steven M. Nowick,...