Sciweavers

234 search results - page 22 / 47
» Examples of Termination
Sort
View
CSFW
2005
IEEE
15 years 5 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
DOCENG
2004
ACM
15 years 5 months ago
Supervised learning for the legacy document conversion
We consider the problem of document conversion from the renderingoriented HTML markup into a semantic-oriented XML annotation defined by user-specific DTDs or XML Schema descrip...
Boris Chidlovskii, Jérôme Fuselier
APN
2004
Springer
15 years 5 months ago
An Approach to Distributed State Space Exploration for Coloured Petri Nets
Abstract. We present an approach and associated computer tool support for conducting distributed state space exploration for Coloured Petri Nets (CPNs). The distributed state space...
Lars Michael Kristensen, Laure Petrucci
ICCS
2004
Springer
15 years 5 months ago
A Dynamic Stochastic Programming Model for Bond Portfolio Management
In this paper we develop a dynamic stochastic programming model for bond portfolio management. A new risk measurement-shortfall cost is put forward. It allows more tangible express...
Liyong Yu, Shouyang Wang, Yue Wu, Kin Keung Lai
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 5 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...