Sciweavers

3579 search results - page 600 / 716
» Transformations of software models into performance models
Sort
View
143
Voted
CCS
2008
ACM
15 years 6 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
145
Voted
WOA
2001
15 years 5 months ago
An Agent Based Design Process for Cognitive Architectures in Robotics
Nowadays, robots have to face very complex tasks, often requiring collaboration between several individuals. As a consequence, robotics can be considered one of the most suitable ...
Antonio Chella, Massimo Cossentino, Ignazio Infant...
122
Voted
IJHPCA
2007
88views more  IJHPCA 2007»
15 years 4 months ago
Scaling Properties of Common Statistical Operators for Gridded Datasets
An accurate cost-model that accounts for dataset size and structure can help optimize geoscience data analysis. We develop and apply a computational model to estimate data analysi...
Charles S. Zender, Harry Mangalam
164
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 1 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto