Sciweavers

1003 search results - page 87 / 201
» A modeling approach and reference models for the analysis of...
Sort
View
IFIP
2004
Springer
14 years 1 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
ISIPTA
2003
IEEE
120views Mathematics» more  ISIPTA 2003»
14 years 1 months ago
Reliability Analysis in Geotechnics with Finite Elements --- Comparison of Probabilistic, Stochastic and Fuzzy Set Methods
The finite element method is widely used for solving various problems in geotechnical engineering practice. The input parameters required for the calculations are generally impre...
Gerd M. Peschl, H. F. Schweiger
CSFW
1999
IEEE
14 years 7 days ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
14 years 8 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
WOSP
2004
ACM
14 years 1 months ago
Early-stage performance modeling and its application for integrated embedded control software design
Most of current embedded control software (ECSW) development techniques deal only with performance specifications during the early software design phase and delay the modeling and...
Shige Wang, Kang G. Shin