Sciweavers

395 search results - page 55 / 79
» Polynomial Approximations for Model Checking
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
14 years 10 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
ICRA
2000
IEEE
125views Robotics» more  ICRA 2000»
15 years 2 months ago
Force-Based Motion Editing for Locomotion Tasks
This paper describes a fast technique for modifying motion sequences for complex articulated mechanisms in a way that preserves physical properties of the motion. This technique i...
Nancy S. Pollard, Fareed Behmaram-Mosavat
CADE
2009
Springer
15 years 4 months ago
Interpolant Generation for UTVPI
Abstract. The problem of computing Craig interpolants in SMT has recently received a lot of interest, mainly for its applications in formal verification. Efficient algorithms for ...
Alessandro Cimatti, Alberto Griggio, Roberto Sebas...
STOC
1994
ACM
128views Algorithms» more  STOC 1994»
15 years 2 months ago
Weakly learning DNF and characterizing statistical query learning using Fourier analysis
We present new results on the well-studied problem of learning DNF expressions. We prove that an algorithm due to Kushilevitz and Mansour [13] can be used to weakly learn DNF form...
Avrim Blum, Merrick L. Furst, Jeffrey C. Jackson, ...
TDSC
2008
152views more  TDSC 2008»
14 years 9 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...