Sciweavers

4340 search results - page 786 / 868
» Formal Methods and Cryptography
Sort
View
FUIN
2010
89views more  FUIN 2010»
15 years 2 months ago
Computing Maximal Error-detecting Capabilities and Distances of Regular Languages
Abstract. A (combinatorial) channel consists of pairs of words representing all possible inputoutput channel situations. In a past paper, we formalized the intuitive concept of “...
Stavros Konstantinidis, Pedro V. Silva
IAJIT
2010
177views more  IAJIT 2010»
15 years 2 months ago
Representing Uncertainty in Medical Knowledge: An Interval Based Approach for Binary Fuzzy Relations
: This paper addresses issues involved in representation of causal relationships between medical categories. An interval based approach for medical binary fuzzy relations is propos...
Bassam Haddad, Ahmad Awwad
ICRA
2010
IEEE
134views Robotics» more  ICRA 2010»
15 years 2 months ago
Understanding and executing instructions for everyday manipulation tasks from the World Wide Web
Service robots will have to accomplish more and more complex, open-ended tasks and regularly acquire new skills. In this work, we propose a new approach to generating plans for su...
Moritz Tenorth, Daniel Nyga, Michael Beetz
IEEEHPCS
2010
15 years 2 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
JNW
2008
116views more  JNW 2008»
15 years 2 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...