Sciweavers

30 search results - page 3 / 6
» A Graph Game Model for Software Tamper Protection
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
13 years 10 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 9 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
FSEN
2009
Springer
13 years 12 months ago
The Complexity of Reachability in Randomized Sabotage Games
Abstract. We analyze a model of fault-tolerant systems in a probabilistic setting. The model has been introduced under the name of “sabotage games”. A reachability problem over...
Dominik Klein, Frank G. Radmacher, Wolfgang Thomas
ENVSOFT
2006
76views more  ENVSOFT 2006»
13 years 5 months ago
LQGraph: A software package for optimizing connectivity in conservation planning
LQGraph implements methods for optimizing the connectivity of sites administered to protect biodiversity (a conservation area network). The methods are suitable for existing prote...
Trevon Fuller, Sahotra Sarkar
CAV
2003
Springer
160views Hardware» more  CAV 2003»
13 years 10 months ago
Fast Mu-Calculus Model Checking when Tree-Width Is Bounded
We show that the model checking problem for µ-calculus on graphs of bounded tree-width can be solved in time linear in the size of the system. The result is presented by first sh...
Jan Obdrzálek