Sciweavers

21 search results - page 2 / 5
» Formal Approaches to Information-Hiding (Tutorial)
Sort
View
SPIN
2007
Springer
13 years 11 months ago
Tutorial: Parallel Model Checking
d Abstract) Luboˇs Brim and Jiˇr´ı Barnat Faculty of Informatics, Masaryk University, Brno, Czech Republic With the increase in the complexity of computer systems, it becomes e...
Lubos Brim, Jiri Barnat
AC
2003
Springer
13 years 9 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
EUSFLAT
2007
152views Fuzzy Logic» more  EUSFLAT 2007»
13 years 6 months ago
Object Oriented Approach in Fuzzy Arithmetic Using Parametric Representation of Fuzzy Numbers
Parametric representation of fuzzy numbers (PFN) with derived methods for performing fuzzy arithmetic proves to have better accuracy and similar computational speed to using trian...
Frantisek Hunka
CCS
2005
ACM
13 years 10 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...