Sciweavers

323 search results - page 29 / 65
» Verifying the Mondex Case Study
Sort
View
JALC
2006
87views more  JALC 2006»
13 years 9 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 8 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
TMC
2012
12 years 8 days ago
Mobile Data Offloading through Opportunistic Communications and Social Participation
—3G networks are currently overloaded, due to the increasing popularity of various applications for smartphones. Offloading mobile data traffic through opportunistic communicatio...
Bo Han, Pan Hui, V. S. Anil Kumar, Madhav V. Marat...
ASE
2002
160views more  ASE 2002»
13 years 9 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
ICPR
2006
IEEE
14 years 11 months ago
Gaussian mixture pdf in one-class classification: computing and utilizing confidence values
In this study a confidence measure for probability density functions (pdfs) is presented. The measure can be used in one-class classification to select a pdf threshold for class i...
Jarmo Ilonen, Pekka Paalanen, Joni-Kristian Kamara...