Sciweavers

525 search results - page 57 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
AMI
2009
Springer
14 years 3 months ago
Behavior Analysis Based on Coordinates of Body Tags
This paper describes fall detection, activity recognition and the detection of anomalous gait in the Confidence project. The project aims to prolong the independence of the elderly...
Mitja Lustrek, Bostjan Kaluza, Erik Dovgan, Bogdan...
DIMVA
2010
13 years 10 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
DGO
2007
174views Education» more  DGO 2007»
13 years 10 months ago
A bootstrapping approach for identifying stakeholders in public-comment corpora
A stakeholder is an individual, group, organization, or community that has an interest or stake in a consensus-building process. The goal of stakeholder identification is identify...
Jaime Arguello, Jamie Callan
TYPES
2004
Springer
14 years 2 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
14 years 3 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni