Sciweavers

31387 search results - page 6164 / 6278
» Abstracts
Sort
View
148
Voted
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 1 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
137
Voted
SAFECOMP
2010
Springer
15 years 1 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska
156
Voted
SAGT
2010
Springer
164views Game Theory» more  SAGT 2010»
15 years 1 months ago
On Nash-Equilibria of Approximation-Stable Games
Abstract. One reason for wanting to compute an (approximate) Nash equilibrium of a game is to predict how players will play. However, if the game has multiple equilibria that are f...
Pranjal Awasthi, Maria-Florina Balcan, Avrim Blum,...
131
Voted
SAS
2010
Springer
140views Formal Methods» more  SAS 2010»
15 years 1 months ago
Multi-dimensional Rankings, Program Termination, and Complexity Bounds of Flowchart Programs
Abstract. Proving the termination of a flowchart program can be done by exhibiting a ranking function, i.e., a function from the program states to a wellfounded set, which strictl...
Christophe Alias, Alain Darte, Paul Feautrier, Lau...
SCN
2010
Springer
122views Communications» more  SCN 2010»
15 years 1 months ago
Recursive Lattice Reduction
Abstract. Lattice reduction is known to be a very powerful tool in modern cryptanalysis. In the literature, there are many lattice reduction algorithms that have been proposed with...
Thomas Plantard, Willy Susilo
« Prev « First page 6164 / 6278 Last » Next »