Sciweavers

1581 search results - page 232 / 317
» Mechanizing Inductive Reasoning
Sort
View
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 6 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
SBMF
2009
Springer
156views Formal Methods» more  SBMF 2009»
15 years 6 months ago
Applying Event and Machine Decomposition to a Flash-Based Filestore in Event-B
Abstract. Event-B is a formal method used for specifying and reasoning about systems. Rodin is a toolset for developing system models in Event-B. Our experiment which is outlined i...
Kriangsak Damchoom, Michael J. Butler
ASIAMS
2008
IEEE
15 years 6 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
CSFW
2008
IEEE
15 years 6 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
ECCB
2008
IEEE
15 years 6 months ago
SIRENE: supervised inference of regulatory networks
Living cells are the product of gene expression programs that involve the regulated transcription of thousands of genes. The elucidation of transcriptional regulatory networks in ...
Fantine Mordelet, Jean-Philippe Vert