Sciweavers

1176 search results - page 225 / 236
» Implicit Abstraction Heuristics
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
LICS
2002
IEEE
15 years 2 months ago
Little Engines of Proof
The automated construction of mathematical proof is a basic activity in computing. Since the dawn of the field of automated reasoning, there have been two divergent schools of tho...
Natarajan Shankar
68
Voted
CP
2001
Springer
15 years 1 months ago
Random 3-SAT and BDDs: The Plot Thickens Further
Abstract. This paper contains an experimental study of the impact of the construction strategy of reduced, ordered binary decision diagrams (ROBDDs) on the average-case computation...
Alfonso San Miguel Aguirre, Moshe Y. Vardi
INFOCOM
2000
IEEE
15 years 1 months ago
Optimal Streaming of Layered Video
Abstract—This paper presents a model and theory for streaming layered video. We model the bandwidth available to the streaming application as a stochastic process whose statistic...
Despina Saparilla, Keith W. Ross
ANTS
2000
Springer
133views Algorithms» more  ANTS 2000»
15 years 1 months ago
Lifting Elliptic Curves and Solving the Elliptic Curve Discrete Logarithm Problem
Abstract. Essentially all subexponential time algorithms for the discrete logarithm problem over nite elds are based on the index calculus idea. In proposing cryptosystems based on...
Ming-Deh A. Huang, Ka Lam Kueh, Ki-Seng Tan