Sciweavers

674 search results - page 95 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SPIN
2012
Springer
11 years 11 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
IJCV
2007
117views more  IJCV 2007»
13 years 9 months ago
Implicit Meshes for Effective Silhouette Handling
Abstract. Using silhouettes in uncontrolled environments typically requires handling occlusions as well as changing or cluttered backgrounds, which limits the applicability of most...
Slobodan Ilic, Mathieu Salzmann, Pascal Fua
SIGSOFT
2000
ACM
14 years 1 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
TCC
2009
Springer
116views Cryptology» more  TCC 2009»
14 years 9 months ago
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Abstract. In this paper we consider commitment schemes that are secure against concurrent man-in-the-middle (cMiM) attacks. Under such attacks, two possible notions of security for...
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
JGS
2010
106views more  JGS 2010»
13 years 3 months ago
On vector autoregressive modeling in space and time
Despite the fact that it provides a potentially useful analytical tool, allowing for the joint modeling of dynamic interdependencies within a group of connected areas, until latel...
Valter Di Giacinto