Sciweavers

1888 search results - page 190 / 378
» Proof theory and computational analysis
Sort
View
163
Voted

Publication
545views
15 years 9 months ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
EKAW
1999
Springer
15 years 5 months ago
Formally Verifying Dynamic Properties of Knowledge Based Systems
Abstract. In this paper we study dynamic properties of knowledge-based systems. We argue the importance of such dynamic properties for the construction and analysis of knowledge-ba...
Perry Groot, Annette ten Teije, Frank van Harmelen
AROBOTS
2006
119views more  AROBOTS 2006»
15 years 26 days ago
A Discussion of Simultaneous Localization and Mapping
This paper aims at a discussion of the structure of the SLAM problem. The analysis is not strictly formal but based both on informal studies and mathematical derivation. The first ...
Udo Frese
FUIN
2006
69views more  FUIN 2006»
15 years 24 days ago
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Traditionally, due to efficiency considerations, when encrypting long messages using an asymmtric cryptosystem, one needs to use a symmetric cryptosystem in addition. To eliminate ...
Sheng Zhong
113
Voted
TSE
1998
85views more  TSE 1998»
15 years 13 days ago
A Methodology for Feature Interaction Detection in the AIN 0.1 Framework
—In this paper, we propose an integrated methodology for specifying AIN and switch-based features and analyzing their interactions in the AIN 0.1 framework. The specification of ...
Fuchun Joseph Lin, Hong Liu, Abhijit Ghosh