Sciweavers

451 search results - page 46 / 91
» Relationless Completeness and Separations
Sort
View
124
Voted
IWSEC
2010
Springer
15 years 2 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
131
Voted
COMPSAC
2010
IEEE
15 years 1 months ago
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The streambased services util...
Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil ...
126
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Future of developer testing: building quality in code
Although much progress has been made in software verification, software testing remains by far the most widely used technique for improving software reliability. Among various typ...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...
125
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Staged concurrent program analysis
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Nishant Sinha, Chao Wang
125
Voted
ICCV
2009
IEEE
15 years 1 months ago
Component analysis approach to estimation of tissue intensity distributions of 3D images
Many segmentation problems in medical imaging rely on accurate modeling and estimation of tissue intensity probability density functions. Gaussian mixture modeling, currently the ...
Arridhana Ciptadi, Cheng Chen, Vitali Zagorodnov