Sciweavers

21 search results - page 2 / 5
» Formal Approaches to Information-Hiding (Tutorial)
Sort
View
87
Voted
SPIN
2007
Springer
15 years 4 months ago
Tutorial: Parallel Model Checking
d Abstract) Luboˇs Brim and Jiˇr´ı Barnat Faculty of Informatics, Masaryk University, Brno, Czech Republic With the increase in the complexity of computer systems, it becomes e...
Lubos Brim, Jiri Barnat
AC
2003
Springer
15 years 1 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
79
Voted
EUSFLAT
2007
152views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Object Oriented Approach in Fuzzy Arithmetic Using Parametric Representation of Fuzzy Numbers
Parametric representation of fuzzy numbers (PFN) with derived methods for performing fuzzy arithmetic proves to have better accuracy and similar computational speed to using trian...
Frantisek Hunka
84
Voted
CCS
2005
ACM
15 years 3 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 2 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...