Sciweavers

3256 search results - page 568 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
LISA
2001
14 years 11 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
CN
2000
76views more  CN 2000»
14 years 9 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
IJCSS
2000
176views more  IJCSS 2000»
14 years 9 months ago
AI-based discrete sliding-mode control for real-time implementation
Combination of sliding-mode control and an AI block based on fuzzy logic is introduced. This hybrid control structure provides very good control performance and robustness of contr...
Vladimir B. Bajic, Daohang Sha, Xinzhong Li, Xingm...
IPPS
2009
IEEE
15 years 4 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
WOLLIC
2009
Springer
15 years 4 months ago
Classic-Like Analytic Tableaux for Finite-Valued Logics
The paper provides a recipe for adequately representing a very inclusive class of finite-valued logics by way of tableaux. The only requisite for applying the method is that the o...
Carlos Caleiro, João Marcos