Sciweavers

1486 search results - page 218 / 298
» Firewall Rules Analysis
Sort
View
CSL
2010
Springer
15 years 1 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ADBIS
2010
Springer
173views Database» more  ADBIS 2010»
15 years 2 days ago
Applying the UFO Ontology to Design an Agent-Oriented Engineering Language
The problem of designing suitable conceptual modeling languages for system engineering is far from being solved. In the past years, some works have proposed the use of foundational...
Renata S. S. Guizzardi, Giancarlo Guizzardi
AMC
2007
177views more  AMC 2007»
15 years 16 hour ago
Quadratic stability and stabilization of switched dynamic systems with uncommensurate internal point delays
This paper deals with the quadratic stability and linear state-feedback and output-feedback stabilization of switched delayed linear dynamic systems with, in general, a finite nu...
Manuel de la Sen
CORR
2010
Springer
219views Education» more  CORR 2010»
14 years 12 months ago
Finding Sequential Patterns from Large Sequence Data
Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mini...
Mahdi Esmaeili, Fazekas Gabor
DM
2007
125views more  DM 2007»
14 years 12 months ago
Generalized switch-setting problems
Switch-setting games like Lights Out are typically modelled as a graph, where the vertices represent switches and lamps, and the edges capture the switching rules. We generalize t...
Torsten Muetze