Sciweavers

107 search results - page 4 / 22
» Specifying the Correctness of Binding-Time Analysis
Sort
View
PRDC
2008
IEEE
14 years 1 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
LPAR
2007
Springer
14 years 1 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
POPL
2011
ACM
12 years 10 months ago
Mathematizing C++ concurrency
Shared-memory concurrency in C and C++ is pervasive in systems programming, but has long been poorly defined. This motivated an ongoing shared effort by the standards committees ...
Mark Batty, Scott Owens, Susmit Sarkar, Peter Sewe...
ICIP
2008
IEEE
14 years 9 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ISMAR
2006
IEEE
14 years 1 months ago
Performance analysis of an outdoor augmented reality tracking system that relies upon a few mobile beacons
We describe and evaluate a new tracking concept for outdoor Augmented Reality. A few mobile beacons added to the environment correct errors in head-worn inertial and GPS sensors. ...
Ronald Azuma, Howard Neely, Mike Daily, Jon Leonar...