Sciweavers

293 search results - page 18 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
132
Voted
ACL
1997
15 years 3 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
103
Voted
ISSTA
2009
ACM
15 years 8 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
CSL
2010
Springer
15 years 2 months ago
Exact Exploration and Hanging Algorithms
Abstract. Recent analysis of sequential algorithms resulted in their axiomatization and in a representation theorem stating that, for any sealgorithm, there is an abstract state ma...
Andreas Blass, Nachum Dershowitz, Yuri Gurevich
EDUTAINMENT
2006
Springer
15 years 5 months ago
A Theatre of Ethics and Interaction? Bertolt Brecht and Learning to Behave in First-Person Shooter Environments
This paper explores the nature of player behaviour in game environments in relation to the methodology of the dramatist Bertolt Brecht. Firstly, a conceptualisation of how manipula...
Dan Pinchbeck
LOPSTR
2001
Springer
15 years 6 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle