Sciweavers

973 search results - page 35 / 195
» Arguing Using Opponent Models
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 1 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
13 years 12 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
BRAIN
2010
Springer
13 years 4 months ago
Domain-Specific Modeling as a Pragmatic Approach to Neuronal Model Descriptions
Biologically realistic modeling has been greatly facilitated by the development of neuro-simulators, and the development of simulatorindependent formats for model exchange is the s...
Ralf Ansorg, Lars Schwabe
DAC
2003
ACM
14 years 8 months ago
A complexity effective communication model for behavioral modeling of signal processing applications
In this paper, we argue that the address space of memory regions that participate in inter task communication is over-specified by the traditional communication models used in beh...
M. N. V. Satya Kiran, M. N. Jayram, Pradeep Rao, S...
AEI
2007
119views more  AEI 2007»
13 years 7 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst