Sciweavers

18 search results - page 1 / 4
» Tinycals: Step by Step Tacticals
Sort
View
ENTCS
2007
86views more  ENTCS 2007»
13 years 4 months ago
Tinycals: Step by Step Tacticals
Most of the state-of-the-art proof assistants are based on procedural proof languages, scripts, and rely on LCF tacticals as the primary tool for tactics composition. In this pape...
Claudio Sacerdoti Coen, Enrico Tassi, Stefano Zacc...
ACSAC
2009
IEEE
13 years 11 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
IAT
2007
IEEE
13 years 11 months ago
Negotiation Dynamics: Analysis, Concession Tactics, and Outcomes
Given that a negotiation outcome is determined to a large extent by the successive offers exchanged by negotiating agents, it is useful to analyze dynamic patterns of the bidding,...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
AISC
2010
Springer
13 years 9 months ago
Structured Formal Development with Quotient Types in Isabelle/HOL
General purpose theorem provers provide sophisticated proof methods, but lack some of the advanced structuring mechanisms found in specification languages. This paper builds on pr...
Maksym Bortin, Christoph Lüth
SCN
2011
Springer
292views Communications» more  SCN 2011»
12 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...