Sciweavers

2211 search results - page 68 / 443
» The state of peer-to-peer simulators and simulations
Sort
View
FSTTCS
2009
Springer
15 years 4 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
BIBE
2008
IEEE
204views Bioinformatics» more  BIBE 2008»
15 years 4 months ago
2D Oculomotor Plant Mathematical Model for eye movement simulation
-This paper builds a two dimensional Oculomotor Plant Mathematical Model (2DOPMM) that is capable of generating eye movement trace on a two dimensional plane. The key difference be...
Oleg Komogortsev, Ukwatta K. S. Jayarathna
TARK
2007
Springer
15 years 3 months ago
A normal simulation of coalition logic and an epistemic extension
In this paper we show how coalition logic can be reduced to the fusion of a normal modal STIT logic for agency and a standard normal temporal logic for discrete time, and how this...
Jan Broersen, Andreas Herzig, Nicolas Troquard
CSFW
2006
IEEE
15 years 3 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
VRML
2000
ACM
15 years 2 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick