Sciweavers

1713 search results - page 33 / 343
» Analysis of Procedure Splitability
Sort
View
CCS
2001
ACM
14 years 1 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
POPL
1996
ACM
14 years 1 months ago
A Practical and Flexible Flow Analysis for Higher-Order Languages
operators. The analysis is abstract interpretation-based and is parameterized over two polyvariance operators and a projection operator. These operators are used to regulate the sp...
J. Michael Ashley
DAGSTUHL
1996
13 years 10 months ago
Specialization of Imperative Programs Through Analysis of Relational Expressions
An analysis method for specialization of imperative programs is described in this paper. This analysis is an inter-procedural data flow method operating on control flow graphs and...
Alexander Sakharov
APN
2010
Springer
13 years 9 months ago
Forward Analysis for Petri Nets with Name Creation
Pure names are identifiers with no relation between them, except equality and inequality. In previous works we have extended P/T nets with the capability of creating and managing p...
Fernando Rosa Velardo, David de Frutos-Escrig
AMCS
2008
146views Mathematics» more  AMCS 2008»
13 years 9 months ago
Fault Detection and Isolation with Robust Principal Component Analysis
Principal component analysis (PCA) is a powerful fault detection and isolation method. However, the classical PCA which is based on the estimation of the sample mean and covariance...
Yvon Tharrault, Gilles Mourot, José Ragot, ...