Sciweavers

1643 search results - page 188 / 329
» Consistability: Describing Usually Consistent Systems
Sort
View
TC
2008
14 years 10 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
MICS
2010
81views more  MICS 2010»
14 years 9 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
MODELS
2009
Springer
15 years 5 months ago
Dead or Alive: finding zombie features in the Linux kernel
Variability management in operating systems is an errorprone and tedious task. This is especially true for the Linux operating system, which provides a specialized tool called Kco...
Reinhard Tartler, Julio Sincero, Wolfgang Schr&oum...
IAAI
2003
14 years 12 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
AAAI
1998
14 years 12 months ago
Learning to Extract Symbolic Knowledge from the World Wide Web
The World Wide Web is a vast source of information accessible to computers, but understandable only to humans. The goal of the research described here is to automatically create a...
Mark Craven, Dan DiPasquo, Dayne Freitag, Andrew M...