Sciweavers

3353 search results - page 34 / 671
» Laver and set theory
Sort
View
ISCI
2008
74views more  ISCI 2008»
14 years 9 months ago
Strong limit theorems for random sets and fuzzy random sets with slowly varying weights
Theories of random sets and fuzzy random sets are useful concepts which are frequently applied in scientific areas including information science, probability and statistics. In th...
Ke-ang Fu, Li-xin Zhang
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 7 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ALDT
2011
Springer
251views Algorithms» more  ALDT 2011»
13 years 9 months ago
Game Theory and Human Behavior: Challenges in Security and Sustainability
Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model...
Rong Yang, Milind Tambe, Manish Jain, Jun-young Kw...
TR
2010
140views Hardware» more  TR 2010»
14 years 4 months ago
Modeling Failure Modes for Residual Life Prediction Using Stochastic Filtering Theory
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Matthew J. Carr, Wenbin Wang
90
Voted
CCS
2011
ACM
13 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta