Sciweavers

1286 search results - page 161 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
PODC
2012
ACM
13 years 3 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
59
Voted
CORR
2011
Springer
176views Education» more  CORR 2011»
14 years 7 months ago
Multiplexed Model Predictive Control
: Most academic control schemes for MIMO systems assume all the control variables are updated simultaneously. MPC outperforms other control strategies through its ability to deal w...
Keck Voon Ling, Jan M. Maciejowski, A. G. Richards...
DSN
2004
IEEE
15 years 4 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
137
Voted
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
15 years 4 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe
105
Voted
ICALP
2010
Springer
15 years 5 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao