Sciweavers

3281 search results - page 344 / 657
» An Approach to use Executable Models for Testing
Sort
View
ESOP
2005
Springer
15 years 10 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
150
Voted
KDD
2008
ACM
259views Data Mining» more  KDD 2008»
16 years 5 months ago
Using ghost edges for classification in sparsely labeled networks
We address the problem of classification in partially labeled networks (a.k.a. within-network classification) where observed class labels are sparse. Techniques for statistical re...
Brian Gallagher, Hanghang Tong, Tina Eliassi-Rad, ...
145
Voted
ICFEM
2007
Springer
15 years 10 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
ICDE
2011
IEEE
262views Database» more  ICDE 2011»
14 years 8 months ago
Memory-constrained aggregate computation over data streams
— In this paper, we study the problem of efficiently computing multiple aggregation queries over a data stream. In order to share computation, prior proposals have suggested ins...
K. V. M. Naidu, Rajeev Rastogi, Scott Satkin, Anan...
IROS
2008
IEEE
101views Robotics» more  IROS 2008»
15 years 11 months ago
Spatial macroscopic models of a bio-inspired robotic swarm algorithm
— We present a comparative study of two spatially resolved macroscopic models of an autonomous robotic swarm. In previous experiments, the collective behavior of 15 autonomous sw...
Heiko Hamann, Heinz Wörn, Karl Crailsheim, Th...