Sciweavers

819 search results - page 48 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
SIGSOFT
2007
ACM
16 years 1 months ago
The symmetry of the past and of the future: bi-infinite time in the verification of temporal properties
Model checking techniques have traditionally dealt with temporal logic languages and automata interpreted over -words, i.e., infinite in the future but finite in the past. However...
Matteo Pradella, Angelo Morzenti, Pierluigi San Pi...
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
PPSN
2004
Springer
15 years 6 months ago
Spread of Vector Borne Diseases in a Population with Spatial Structure
Mathematical modeling of the spread of infectious diseases is a well established field with high practical importance. Underlying most analytical approaches is the assumption of ...
Dominique Chu, Jonathan E. Rowe
115
Voted
IVC
2007
72views more  IVC 2007»
15 years 3 days ago
A sensitivity analysis method and its application in physics-based nonrigid motion modeling
Parameters used in physical models for nonrigid and articulated motion analysis are often not known with high precision. It has been recognized that commonly used assumptions abou...
Yong Zhang, Dmitry B. Goldgof, Sudeep Sarkar, Leon...