Sciweavers

3897 search results - page 719 / 780
» complexity 2010
Sort
View
108
Voted
CHI
2010
ACM
15 years 5 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
137
Voted
CSFW
2010
IEEE
15 years 5 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
CSFW
2010
IEEE
15 years 5 months ago
A Game-Based Definition of Coercion-Resistance and Its Applications
Coercion-resistance is one of the most important and intricate security requirements for voting protocols. Several definitions of coercion-resistance have posed in the literature,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
159
Voted
DAC
2010
ACM
15 years 5 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
154
Voted
ECBS
2010
IEEE
230views Hardware» more  ECBS 2010»
15 years 5 months ago
A Model-Based Regression Testing Approach for Evolving Software Systems with Flexible Tool Support
Model-based selective regression testing promises reduction in cost and labour by selecting a subset of the test suite corresponding to the modifications after system evolution. H...
Qurat-ul-ann Farooq, Muhammad Zohaib Z. Iqbal, Zaf...