Sciweavers

41 search results - page 4 / 9
» Improving medical protocols by formal methods
Sort
View
FMICS
2007
Springer
15 years 4 months ago
Analysis of a Session-Layer Protocol in mCRL2
Abstract. This paper reports the analysis of an industrial implementation of the session-layer of a load-balancing software system. This software comprises 7.5 thousand lines of C ...
Marko C. J. D. van Eekelen, Stefan ten Hoedt, Ren&...
IPL
2006
118views more  IPL 2006»
14 years 9 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
MICCAI
2010
Springer
14 years 8 months ago
Appearance Normalization of Histology Slides
Abstract. This paper presents a method for automatic color and intensity normalization of digitized histology slides stained with two different agents. In comparison to previous a...
Marc Niethammer, David Borland, J. S. Marron, John...
BMCBI
2007
146views more  BMCBI 2007»
14 years 10 months ago
Spatial location and its relevance for terminological inferences in bio-ontologies
Background: An adequate and expressive ontological representation of biological organisms and their parts requires formal reasoning mechanisms for their relations of physical aggr...
Stefan Schulz, Kornél G. Markó, Udo ...
JCS
2010
80views more  JCS 2010»
14 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...