Sciweavers

SAC
2009
ACM
14 years 7 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
SAC
2009
ACM
14 years 7 months ago
NECTAR: a DTN routing protocol based on neighborhood contact history
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
Etienne C. R. de Oliveira, Célio V. N. de A...
SAC
2009
ACM
14 years 7 months ago
Network protocol interoperability testing based on contextual signatures and passive testing
This paper presents a methodology for interoperability testing based on contextual signatures and passive testing with invariants. The concept of contextual signature offers a fra...
Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli
SAC
2009
ACM
14 years 7 months ago
Development of a biosignals framework for usability analysis
The understanding of human physical and physiological signals and expressions, together with a growing processing and control capacity allows for new approaches in interactive sys...
Inês Oliveira, Rui Lopes, Nuno Guimarã...
SAC
2009
ACM
14 years 7 months ago
Collaborative modeling of business processes: a comparative case study
We study collaborative modeling of business processes with respect to the impact of tool support on the modeling process. For this purpose we compared model quality and modeling c...
Peter Rittgen
SAC
2009
ACM
14 years 7 months ago
Variable handling in time-based XML declarative languages
This paper focuses on time-based declarative languages. The use of declarative languages has the advantage of their simplicity and gh-level abstraction, usually requiring few or n...
Luiz Fernando Gomes Soares, Rogério Ferreir...
SAC
2009
ACM
14 years 7 months ago
Local reasoning for abstraction and sharing
Renato Cherini, Javier O. Blanco
SAC
2009
ACM
14 years 7 months ago
Using minimum description length for process mining
Toon Calders, Christian W. Günther, Mykola Pe...
SAC
2009
ACM
14 years 7 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin
SAC
2009
ACM
14 years 7 months ago
Component-based metrics applying the strength of dependency between classes
Component-Based Development(CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we ...
Misook Choi, Injoo J. Kim, Jiman Hong, Jungyeop Ki...