Sciweavers

1615 search results - page 3 / 323
» Computer science and decision theory
Sort
View
ICALP
2005
Springer
13 years 10 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
ATAL
2008
Springer
13 years 7 months ago
Computer science and game theory
Game theory has been playing an increasingly visible role in computer science, in areas as diverse as artificial intelligence, theory, and distributed systems, among others. I tak...
Yoav Shoham
JACIII
2006
69views more  JACIII 2006»
13 years 5 months ago
Towards a Model of Computer Science Graduate Admissions Decisions
Potential applicants to graduate school find it difficult to predict, even approximately, which schools will accept them. We have created a predictive model of admissions decision...
Nigel Ward
RTA
2009
Springer
13 years 12 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...