Sciweavers

3318 search results - page 106 / 664
» The Weak Instance Model
Sort
View
ESORICS
2010
Springer
15 years 5 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
121
Voted
ICRA
2010
IEEE
139views Robotics» more  ICRA 2010»
15 years 2 months ago
Dynamic modelling and control of variable stiffness actuators
— After briefly summarizing the mechanical design of the two joint prototypes for the new DLR variable compliance arm, the paper exemplifies the dynamic modelling of one of the...
Alin Albu-Schäffer, Sebastian Wolf, Oliver Ei...
GI
2009
Springer
15 years 1 months ago
Project Planning Support by Model Checking
Abstract: Today's trend in software and system engineering is to utilize more specialized models. This model-based development approach makes a single engineering task more ea...
Björn Axenath, Oliver Sudmann
HPCC
2007
Springer
15 years 10 months ago
The One-Click Grid-Resource Model
This paper introduces the One-Click Grid resource, which allows any computer with a Java enabled web browser to safely provide resources to Grid without any software installation. ...
Martin Rehr, Brian Vinter
IJCNN
2006
IEEE
15 years 10 months ago
Automated Model Selection (AMS) on Finite Mixtures: A Theoretical Analysis
— From the Bayesian Ying-Yang (BYY) harmony learning theory, a harmony function has been developed for finite mixtures with a novel property that its maximization can make model...
Jinwen Ma