Sciweavers

517 search results - page 67 / 104
» Specification transformers: a predicate transformer approach...
Sort
View
COMGEO
2004
ACM
13 years 8 months ago
How to draw the minimum cuts of a planar graph
We show how to utilize the cactus representation of all minimum cuts of a graph to visualize the minimum cuts of a planar graph in a planar drawing. In a first approach the cactus...
Ulrik Brandes, Sabine Cornelsen, Christian Fie&szl...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 3 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ICIP
2003
IEEE
14 years 10 months ago
Wavelet-based level set evolution for classification of textured images
We present a supervised classification model based on a variational approach. This model is specifically devoted to textured images. We want to get a partition of an image, compos...
Jean-François Aujol, Gilles Aubert, Laure B...
ICLP
2009
Springer
14 years 9 months ago
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
Abstract. We present a framework that unifies unit testing and runtime verification (as well as static verification and static debugging). A key contribution of our overall approac...
Edison Mera, Manuel V. Hermenegildo, Pedro L&oacut...