Sciweavers

5255 search results - page 362 / 1051
» Formal Methods for Privacy
Sort
View
MICAI
2000
Springer
15 years 8 months ago
A Neurocontrol Scheme of a 2-DOF Manipulator Using CMAC
Artificial Neural Networks (ANN) are an emerging technology, yet, in continuous dynamic behavior, much work has been done to attempt to generate a formal method to design a contro...
Raúl Leal Ascencio, Marco A. Pérez C...
162
Voted
SWWS
2008
15 years 6 months ago
A New Knowledge Representation Model to Support Multilingual Ontologies. A case Study
- Knowledge extraction methods have not efficiently evolved towards new methods to automate the process of building multilingual ontologies as the main representation of structured...
Jesús Cardeñosa, Carolina Gallardo, ...
FMICS
2008
Springer
15 years 6 months ago
Fighting State Space Explosion: Review and Evaluation
In order to apply formal methods in practice, the practitioner has to comprehend a vast amount of research literature and realistically evaluate practical merits of different appr...
Radek Pelánek
FMCO
2009
Springer
203views Formal Methods» more  FMCO 2009»
15 years 2 months ago
Applying Event-B Atomicity Decomposition to a Multi Media Protocol
Abstract. Atomicity Decomposition is a technique in the Event-B formal method, which augments Event-B refinement with additional structuring in a diagrammatic notation to support c...
Asieh Salehi Fathabadi, Michael Butler
146
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 11 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald