Sciweavers

114 search results - page 17 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
AIRWEB
2008
Springer
13 years 9 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
DSVIS
2005
Springer
14 years 1 months ago
Test of the ICARE Platform Fusion Mechanism
Multimodal interactive systems offer a flexibility of interaction that increases their complexity. ICARE is a component-based approach to specify and develop multimodal interfaces...
Sophie Dupuy-Chessa, Lydie du Bousquet, Jullien Bo...
IEEEIAS
2007
IEEE
14 years 1 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
MR
2010
120views Robotics» more  MR 2010»
13 years 6 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
MDM
2007
Springer
209views Communications» more  MDM 2007»
14 years 1 months ago
Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks
The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for den...
Andrew T. Zimmerman, Jerome P. Lynch