Sciweavers

395 search results - page 55 / 79
» Polynomial Approximations for Model Checking
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
14 years 11 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
ICRA
2000
IEEE
125views Robotics» more  ICRA 2000»
15 years 4 months ago
Force-Based Motion Editing for Locomotion Tasks
This paper describes a fast technique for modifying motion sequences for complex articulated mechanisms in a way that preserves physical properties of the motion. This technique i...
Nancy S. Pollard, Fareed Behmaram-Mosavat
CADE
2009
Springer
15 years 6 months ago
Interpolant Generation for UTVPI
Abstract. The problem of computing Craig interpolants in SMT has recently received a lot of interest, mainly for its applications in formal verification. Efficient algorithms for ...
Alessandro Cimatti, Alberto Griggio, Roberto Sebas...
STOC
1994
ACM
128views Algorithms» more  STOC 1994»
15 years 3 months ago
Weakly learning DNF and characterizing statistical query learning using Fourier analysis
We present new results on the well-studied problem of learning DNF expressions. We prove that an algorithm due to Kushilevitz and Mansour [13] can be used to weakly learn DNF form...
Avrim Blum, Merrick L. Furst, Jeffrey C. Jackson, ...
TDSC
2008
152views more  TDSC 2008»
14 years 11 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...