Sciweavers

123 search results - page 20 / 25
» Abstracting out Byzantine Behavior
Sort
View
KBSE
2002
IEEE
14 years 16 days ago
Process Support for Tools Interoperability
Commercial tools are heavily used, relatively cheap, well maintained, and provide powerful functionalities. However, composing these tools in order to build larger applications ra...
Anh-Tuyet Le
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
FUIN
2010
136views more  FUIN 2010»
13 years 5 months ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
JOC
2010
123views more  JOC 2010»
13 years 2 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
ROBOCUP
2004
Springer
133views Robotics» more  ROBOCUP 2004»
14 years 29 days ago
Towards a League-Independent Qualitative Soccer Theory for RoboCup
The paper discusses a top-down approach to model soccer knowledge, as it can be found in soccer theory books. The goal is to model soccer strategies and tactics in a way that they ...
Frank Dylla, Alexander Ferrein, Gerhard Lakemeyer,...