Sciweavers

1040 search results - page 31 / 208
» Resource Usage Verification
Sort
View
FASE
2009
Springer
14 years 1 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
TIFS
2010
140views more  TIFS 2010»
13 years 4 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
CEAS
2007
Springer
14 years 4 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
ASWEC
2006
IEEE
14 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
CCGRID
2010
IEEE
13 years 11 months ago
Unibus-managed Execution of Scientific Applications on Aggregated Clouds
In this paper we examine the feasibility of running message passing applications across clouds. Our on-going Unibus project aims to provide a flexible approach to provisioning and ...
Jaroslaw Slawinski, Magdalena Slawiñska, Va...