Sciweavers

434 search results - page 71 / 87
» Logical Analysis of Hash Functions
Sort
View
REX
1991
15 years 3 months ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
112
Voted
COMMA
2008
15 years 1 months ago
Requirements for reflective argument visualization tools: A Case for Using Validity as a Normative Standard
This paper formulates in the first part some requirements for a certain sort of computational argumentation systems, namely those which are designed for a very specific purpose: to...
Michael H. G. Hoffmann
ISSA
2004
15 years 1 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
EUSFLAT
2009
134views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Flow Line Systems with Possibilistic Data: a System with Waiting Time in Line Uncertain
This paper proposes to analyze two flow line systems in which we include possibilistic data -the priority-discipline is possibilistic instead of probabilistic- and measure the perf...
David de la Fuente, María José Pardo
CCS
2011
ACM
14 years 10 days ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum