Sciweavers

749 search results - page 47 / 150
» Combinatory Models and Symbolic Computation
Sort
View
LICS
2006
IEEE
14 years 3 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
AVI
2004
13 years 11 months ago
Sim-U-Sketch: a sketch-based interface for SimuLink
Sim-U-Sketch is an experimental sketch-based interface we developed for Matlab 's Simulink software package. With this tool, users can construct functional Simulink models si...
Levent Burak Kara, Thomas F. Stahovich
ARTS
1999
Springer
14 years 2 months ago
Verifying Progress in Timed Systems
In this paper we study the issue of progress for distributed timed systems modeled as the parallel composition of timed automata. We clarify the requirements of discrete progress (...
Stavros Tripakis
CCS
2009
ACM
14 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
GECCO
2005
Springer
166views Optimization» more  GECCO 2005»
14 years 3 months ago
The emulation of social institutions as a method of coevolution
This paper offers a novel approach to coevolution based on the sociological theory of symbolic interactionism. It provides a multi-agent computational model along with experimenta...
Deborah Vakas Duong, John J. Grefenstette