Sciweavers

247 search results - page 18 / 50
» Perspectives in Probabilistic Verification
Sort
View
110
Voted
CCS
2009
ACM
15 years 8 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
CONCUR
2010
Springer
15 years 2 months ago
Generic Forward and Backward Simulations II: Probabilistic Simulation
Jonsson and Larsen's notion of probabilistic simulation is studied from a coalgebraic perspective. The notion is compared with two generic coalgebraic definitions of simulatio...
Ichiro Hasuo
96
Voted
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 8 months ago
Visual explanations of probabilistic reasoning
Continuing our research in explanation-oriented language design, we present a domain-specific visual language for explaining probabilistic reasoning. Programs in this language, c...
Martin Erwig, Eric Walkingshaw
ENTCS
2008
84views more  ENTCS 2008»
15 years 1 months ago
Coalgebraic Trace Semantics for Combined Possibilitistic and Probabilistic Systems
Non-deterministic (also known as possibilistic) and probabilistic state based systems (or automata) have been studied for quite some time. Separately, they are reasonably well-und...
Bart Jacobs
105
Voted
AFRICACRYPT
2008
Springer
15 years 3 months ago
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees
Proof-of-work schemes are economic measures to deter denial-of-service attacks: service requesters compute moderately hard functions the results of which are easy to check by the ...
Fabien Coelho