Sciweavers

2632 search results - page 410 / 527
» Alternating Timed Automata
Sort
View
125
Voted
CCS
2008
ACM
15 years 3 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 3 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
APN
2006
Springer
15 years 3 months ago
Invariant Based Programming
Program verification is usually done by adding specifications and invariants to the program and then proving that the verification conditions are all true. This makes program verif...
Ralph-Johan Back
HT
2010
ACM
15 years 3 months ago
Assessing users' interactions for clustering web documents: a pragmatic approach
In this paper we are interested in describing Web pages by how users interact within their contents. Thus, an alternate but complementary way of labelling and classifying Web docu...
Luis A. Leiva, Enrique Vidal
113
Voted
CPAIOR
2008
Springer
15 years 3 months ago
Leveraging Belief Propagation, Backtrack Search, and Statistics for Model Counting
We consider the problem of estimating the model count (number of solutions) of Boolean formulas, and present two techniques that compute estimates of these counts, as well as eith...
Lukas Kroc, Ashish Sabharwal, Bart Selman