Sciweavers

457 search results - page 87 / 92
» cores 2005
Sort
View
84
Voted
ESORICS
2005
Springer
15 years 3 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
15 years 3 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
ICCS
2005
Springer
15 years 2 months ago
High-Fidelity Simulation of Large-Scale Structures
Active structures capable of responding to external stimulii represent the emerging frontier in structural design. Robust and real-time sensing, control, and actuation pose fundame...
Christoph Hoffmann, Ahmed H. Sameh, Ananth Grama
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 2 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
72
Voted
ISW
2005
Springer
15 years 2 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei