Sciweavers

657 search results - page 108 / 132
» Recovering architectural assumptions
Sort
View
CCS
2008
ACM
13 years 11 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
FLAIRS
2004
13 years 11 months ago
Decision Tree Extraction from Trained Neural Networks
Artificial Neural Networks (ANNs) have proved both a popular and powerful technique for pattern recognition tasks in a number of problem domains. However, the adoption of ANNs in ...
Darren Dancey, David McLean, Zuhair Bandar
FORTE
2004
13 years 11 months ago
Formal Composition of Distributed Scenarios
Eliciting, modeling, and analyzing the requirements are the main challenges to face up when you want to produce a formal specification for distributed systems. The distribution and...
Aziz Salah, Rabeb Mizouni, Rachida Dssouli, Benoit...
NIPS
2001
13 years 11 months ago
A theory of neural integration in the head-direction system
Integration in the head-direction system is a computation by which horizontal angular head velocity signals from the vestibular nuclei are integrated to yield a neural representat...
Richard H. R. Hahnloser, Xiaohui Xie, H. Sebastian...
GPCE
2008
Springer
13 years 10 months ago
On the modularity of feature interactions
Feature modules are the building blocks of programs in software product lines (SPLs). A foundational assumption of feature-based program synthesis is that features are composed in...
Chang Hwan Peter Kim, Christian Kästner, Don ...