Sciweavers

7988 search results - page 157 / 1598
» A Useful Undecidable Theory
Sort
View
94
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 20 days ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
101
Voted
STTT
2008
95views more  STTT 2008»
15 years 20 days ago
FAST: acceleration from theory to practice
Abstract. Fast is a tool for the analysis of systems manipulating unbounded integer variables. We check safety properties by computing the reachability set of the system under stud...
Sébastien Bardin, Alain Finkel, Jér&...
115
Voted
EC
1998
134views ECommerce» more  EC 1998»
15 years 13 days ago
Schema Theory for Genetic Programming with One-Point Crossover and Point Mutation
In this paper we first review the main results obtained in the theory of schemata in Genetic Programming (GP) emphasising their strengths and weaknesses. Then we propose a new, s...
Riccardo Poli, William B. Langdon
87
Voted
ISOLA
2010
Springer
14 years 11 months ago
A Theory of Mediators for Eternal Connectors
On the fly synthesis of mediators is a revolutionary approach to the seamless networking of today’s and future digital systems that increasingly need be connected. The resulting...
Paola Inverardi, Valérie Issarny, Romina Sp...
IAT
2010
IEEE
14 years 10 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski