Sciweavers

137 search results - page 18 / 28
» A Practical Formal Model for Safety Analysis in Capability-B...
Sort
View
CCS
2010
ACM
13 years 7 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
P2P
2006
IEEE
14 years 22 days ago
Cost-Based Analysis of Hierarchical DHT Design
Flat DHT architectures have been the main focus of the research on DHT design so far. However, there have been also a number of works proposing hierarchical DHT organizations and ...
Stefan Zöls, Zoran Despotovic, Wolfgang Kelle...
ICMLA
2009
13 years 4 months ago
Sensitivity Analysis of POMDP Value Functions
In sequential decision making under uncertainty, as in many other modeling endeavors, researchers observe a dynamical system and collect data measuring its behavior over time. The...
Stéphane Ross, Masoumeh T. Izadi, Mark Merc...
B
2007
Springer
13 years 10 months ago
Automatic Translation from Combined B and CSP Specification to Java Programs
Abstract. A recent contribution to the formal specification and verification of concurrent systems is the integration of the state- and event-based approaches B and CSP, specifical...
Letu Yang, Michael Poppleton
IJMI
2007
134views more  IJMI 2007»
13 years 6 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll