Sciweavers

617 search results - page 113 / 124
» Using Formal Methods in a Retrospective Safety Case
Sort
View
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
ESWS
2006
Springer
15 years 3 months ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...
ICTAI
1997
IEEE
15 years 3 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
SERP
2004
15 years 1 months ago
Locating Features in Distributed Systems
In distributed systems, just as in conventional software, it is often necessary to locate the software components that implement a particular user feature. Several dynamic analysi...
Sharon Simmons, Dennis Edwards, Norman Wilde
GLOBECOM
2008
IEEE
14 years 12 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...