Sciweavers

66 search results - page 12 / 14
» Formal Modeling of C. elegans Development: A Scenario-Based ...
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 1 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CODES
2006
IEEE
15 years 3 months ago
Generic netlist representation for system and PE level design exploration
Designer productivity and design predictability are vital factors for successful embedded system design. Shrinking time-to-market and increasing complexity of these systems requir...
Bita Gorjiara, Mehrdad Reshadi, Pramod Chandraiah,...
SPATIALCOGNITION
2004
Springer
15 years 2 months ago
Towards Dialogue Based Shared Control of Navigating Robots
Establishing a clean relationship between a robot’s spatial model and natural language components is a non-trivial task, but is key to designing verbally controlled, navigating s...
Robert J. Ross, Hui Shi, Tillman Vierhuff, Bernd K...
CUZA
2002
132views more  CUZA 2002»
14 years 9 months ago
A Process Algebra for Predictible Control Systems
This paper presents Process Algebra for Predictible Control Systems (PAPCS) as a model for specifying and analysis of concurrent, time and resource dependent, distributed control s...
Nicolae Marian
CCS
2007
ACM
15 years 3 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia