|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 17 keywords
|
|
|
Results
Found 33 publication records. Showing 33 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Georg Thimm, S. Ben-Yacoub, Juergen Luettin |
Evaluating the complexity of databases for person identification and verification. |
CAIP |
1999 |
DBLP DOI BibTeX RDF |
Person identi cation, person veri cation, database evaluation |
71 | Salvador Cavadini, Diego Cheda |
Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
security, information flow, dependence graphs |
59 | Krishnendu Chatterjee, Pallab Dasgupta, P. P. Chakrabarti 0001 |
Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Thomas A. Henzinger |
Model Checking: From Hardware to Software. |
APLAS |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Karun N. Biyani, Sandeep S. Kulkarni |
Building component families to support adaptation. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
veri cation, autonomic computing, component-based systems, dynamic adaptation |
52 | Ganesh J. Pai, Joanne Bechta Dugan, Khalid Lateef |
Bayesian Networks applied to Software IV&V. |
SEW |
2005 |
DBLP DOI BibTeX RDF |
software requirements speci.cations, independent veri.cation and validation, Use cases, software reliability engineering, probabilistic networks |
52 | Stephen S. Yau, Supratik Mukhopadhyay, Ramesh Bharadwaj |
Specification, Analysis and Implementation of Architectural Patterns for Dependable Software Systems. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
dependable software, speci.cation languages, veri.cation, formal analysis, Architectural patterns |
52 | Leonardo Mariani |
Behavior Capture and Test for Verifying Evolving Component-Based Systems. |
ICSE |
2004 |
DBLP DOI BibTeX RDF |
Run-time veri.cation of evolving component-based systems |
41 | Waheeda Jabbar |
Geographic Routing and Location Veri cation for Wireless Networks. |
|
2022 |
RDF |
|
41 | Ryo Yanase |
Abstraction Refinement for Non-Zeno Fairness Veri?cation of Linear Hybrid Automata. |
ICST |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Shin Nakajima 0001, Jean-Pierre Talpin, Masumi Toyoshima, Huafeng Yu |
Architecture-Centric Modeling, Analysis, and Veri cation of Cyber-Physical Systems (NII Shonan Meeting 2016-5). |
NII Shonan Meet. Rep. |
2016 |
DBLP BibTeX RDF |
|
41 | Qiang Tang 0001, Balazs Pejo |
Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
41 | Youcef Hammal, Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim |
Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks. |
Stud. Inform. Univ. |
2014 |
DBLP BibTeX RDF |
|
41 | Adrian Kent, Serge Massar, Jonathan Silman |
Secure and Robust Transmission and Veri?cation of Unknown Quantum States in Minkowski Space |
CoRR |
2012 |
DBLP BibTeX RDF |
|
41 | |
Efficient Mix-Net Veri cation by Proofs of Random Blocks. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
41 | Francesco Stefanni |
A design and veri?cation methodology for networked embedded systems. |
|
2011 |
RDF |
|
41 | Dirk Colbry, George C. Stockman, Anil K. Jain 0001 |
Detection of Anchor Points for 3D Face Veri.cation. |
CVPR Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Namrata Shekhar, Priyank Kalla, Sivaram Gopalakrishnan, Florian Enescu |
Exploiting Vanishing Polynomials for Equivalence Veri.cation of Fixed-Size Arithmetic Datapaths. |
ICCD |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Michael Baldamus, Jesper Bengtson, Gian-Luigi Ferrari 0002, Roberto Raggi |
Web Services as a New Approach to Distributing and Coordinating Semantics-Based Veri cation Toolkits. |
WSFM |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Christopher A. Rouff, Michael G. Hinchey, James L. Rash, Walter Truszkowski |
Towards a Hybrid Formal Method for Swarm-Based Exploration Missions. |
SEW |
2005 |
DBLP DOI BibTeX RDF |
Swarm Technology, Verification, Formal Methods |
41 | Charles Pecheur |
Challenges Arising from Applications. |
FAABS |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
Refinement Types for Secure Implementations. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Matthias Woehrle, Christian Plessl, Roman Lim, Jan Beutel, Lothar Thiele |
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networl, testing, event analysis |
29 | Dimitra Giannakopoulou, Corina S. Pasareanu |
Learning-Based Assume-Guarantee Verification (Tool Paper). |
SPIN |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Große, Rolf Drechsler |
Acceleration of SAT-Based Iterative Property Checking. |
CHARME |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Victor L. Winter, Jason Beranek, Azamatbek Mametjanov, Fares Fraij, Steve Roach |
A Transformational Overview of the Core Functionality of an Abstract Class Loader for the SSP. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Shay Gueron, Or Zuk |
Applications of The Montgomery Exponent. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
ef£cient implementations, Montgomery multiplication, modular exponentiation |
29 | Hervé Brönnimann, Nasir D. Memon, Kulesh Shanmugasundaram |
String Matching on the Internet. |
CAAN |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ismail Kadayif, Mahmut T. Kandemir, Ibrahim Kolcu |
Exploiting Processor Workload Heterogeneity for Reducing Energy Consumption in Chip Multiprocessors. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Panagiotis Manolios, Sudarshan K. Srinivasan |
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Kar-Ann Toh |
Fingerprint and speaker verification decisions fusion. |
ICIAP |
2003 |
DBLP DOI BibTeX RDF |
|
29 | John F. Canny |
Collaborative Filtering with Privacy. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Donald Beaver |
Adaptively Secure Oblivious Transfer. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #33 of 33 (100 per page; Change: )
|
|