Sciweavers

1139 search results - page 9 / 228
» Bounded Ideation Theory
Sort
View
CCS
2010
ACM
13 years 5 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
CSL
2009
Springer
14 years 2 months ago
Automatic Structures of Bounded Degree Revisited
Abstract. It it shown that the first-order theory of an automatic structure, whose Gaifman graph has bounded degree, is decidable in doubly exponential space (for injective automa...
Dietrich Kuske, Markus Lohrey
AI
2010
Springer
13 years 4 months ago
Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such...
James Pita, Manish Jain, Milind Tambe, Fernando Or...
WCET
2010
13 years 5 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
IWIPS
2007
113views Business» more  IWIPS 2007»
13 years 9 months ago
Cross Cultural Study: Perception, Usage, and Adoption of Technology
The primary goal of the project was to understand the cultural similarities and differences in perception, adoption and usage of technology across three cultures (US, India and Ch...
Apala Lahiri Chavan, Beena Prabhu, Warren Greving