Sciweavers

234 search results - page 16 / 47
» Examples of Termination
Sort
View
CSFW
2011
IEEE
14 years 1 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
112
Voted
BROADNETS
2007
IEEE
15 years 8 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
141
Voted
CIE
2008
Springer
15 years 3 months ago
Recursion on Nested Datatypes in Dependent Type Theory
Nested datatypes are families of datatypes that are indexed over all types and where the datatype constructors relate different members of the family. This may be used to represent...
Ralph Matthes
115
Voted
ICCV
2005
IEEE
16 years 3 months ago
Feature Hierarchies for Object Classification
The paper describes a method for automatically extracting informative feature hierarchies for object classification, and shows the advantage of the features constructed hierarchic...
Boris Epshtein, Shimon Ullman
209
Voted
POPL
2008
ACM
16 years 2 months ago
Proving non-termination
The search for proof and the search for counterexamples (bugs) are complementary activities that need to be pursued concurrently in order to maximize the practical success rate of...
Ashutosh Gupta, Thomas A. Henzinger, Rupak Majumda...