Sciweavers

1104 search results - page 61 / 221
» A Comparison of State-Based Modelling Tools for Model Valida...
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 2 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
DATE
2006
IEEE
83views Hardware» more  DATE 2006»
14 years 2 months ago
What lies between design intent coverage and model checking?
Practitioners of formal property verification often work around the capacity limitations of formal verification tools by breaking down properties into smaller properties that ca...
Sayantan Das, Prasenjit Basu, Pallab Dasgupta, P. ...
PAMI
2008
140views more  PAMI 2008»
13 years 8 months ago
Simplifying Mixture Models Using the Unscented Transform
Mixture of Gaussians (MoG) model is a useful tool in statistical learning. In many learning processes that are based on mixture models, computational requirements are very demandin...
Jacob Goldberger, Hayit Greenspan, Jeremie Dreyfus...
SODA
2010
ACM
149views Algorithms» more  SODA 2010»
14 years 6 months ago
Data-Specific Analysis of String Sorting
We consider the complexity of sorting strings in the model that counts comparisons between symbols and not just comparisons between strings. We show that for any set of strings S ...
Raimund Seidel
SAC
2002
ACM
13 years 8 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...