Sciweavers

94 search results - page 14 / 19
» A Performance Study of BDD-Based Model Checking
Sort
View
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 3 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
FMICS
2008
Springer
13 years 8 months ago
Fighting State Space Explosion: Review and Evaluation
In order to apply formal methods in practice, the practitioner has to comprehend a vast amount of research literature and realistically evaluate practical merits of different appr...
Radek Pelánek
SACMAT
2009
ACM
14 years 1 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ISBRA
2010
Springer
13 years 5 months ago
Analysis of Gene Interactions Using Restricted Boolean Networks and Time-Series Data
A popular model for gene regulatory networks is the Boolean network model. In this paper, we propose an algorithm to perform an analysis of gene regulatory interactions using the B...
Carlos H. A. Higa, Vitor H. P. Louzada, Ronaldo Fu...
PR
2008
131views more  PR 2008»
13 years 7 months ago
A memetic algorithm for evolutionary prototype selection: A scaling up approach
Prototype selection problem consists of reducing the size of databases by removing samples that are considered noisy or not influential on nearest neighbour classification tasks. ...
Salvador García, José Ramón C...