Sciweavers

796 search results - page 124 / 160
» Spoofing prevention method
Sort
View
SCP
2010
96views more  SCP 2010»
13 years 8 months ago
Enforcing structural regularities in software using IntensiVE
The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-call...
Johan Brichau, Andy Kellens, Sergio Castro, Theo D...
QEST
2010
IEEE
13 years 7 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
FLAIRS
2009
13 years 7 months ago
Improving Biomedical Document Retrieval by Mining Domain Knowledge
When research articles introduce new findings or concepts they typically relate them only to knowledge and domain concepts of immediate relevance. However, many domain concepts re...
Shuguang Wang, Milos Hauskrecht
CJ
2010
150views more  CJ 2010»
13 years 7 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 7 months ago
Integrating digital human modeling into virtual environment for ergonomic oriented design
Virtual human simulation integrated into virtual reality applications is mainly used for virtual representation of the user in virtual environment or for interactions between the ...
Liang Ma, Damien Chablat, Fouad Bennis, Bo Hu, Wei...