Sciweavers

2429 search results - page 147 / 486
» Using Aspects to Design a Secure System
Sort
View
USENIX
2004
13 years 10 months ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....
IWFM
1998
113views Formal Methods» more  IWFM 1998»
13 years 10 months ago
A Use Case Interpretation of B AMN
In this paper we suggest methods to aid the development of specifications using the B method. We propose an objectoriented approach to specification, developing the structure thro...
Richard Shore
CCS
2004
ACM
14 years 2 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
ICMCS
2008
IEEE
147views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Hand trajectory based gesture recognition using self-organizing feature maps and markov models
This work presents the design and experimental verification of an original system architecture aiming at recognizing gestures based solely on the hand trajectory. Self organizing ...
George Caridakis, Kostas Karpouzis, Christos Pater...
IEEEARES
2008
IEEE
14 years 3 months ago
Reliability Analysis using Graphical Duration Models
Reliability analysis has become an integral part of system design and operating. This is especially true for systems performing critical tasks such as mass transportation systems....
Roland Donat, Laurent Bouillaut, Patrice Aknin, Ph...