Sciweavers

1156 search results - page 58 / 232
» Compositional Methods for Information-Hiding
Sort
View
ESOP
2004
Springer
14 years 1 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CDC
2009
IEEE
153views Control Systems» more  CDC 2009»
14 years 11 days ago
Compositional stability analysis based on dual decomposition
— We propose a compositional stability analysis methodology for verifying properties of systems that are interconnections of multiple subsystems. The proposed method assembles st...
Ufuk Topcu, Andrew K. Packard, Richard M. Murray
MVA
1996
13 years 9 months ago
Recognition of Composite Elements in Bar Graphs
The issue of graph recognition has been not always investigated until today though the subjects on the document image understanding are very interest and have proposed many method...
Naoko Yokokura, Toyohide Watanabe
APIN
2006
65views more  APIN 2006»
13 years 7 months ago
Granularity and disaggregation in compositional modelling with applications to ecological systems
In the past decade, compositional modelling (CM) has established itself as the predominant knowledge-based approach to construct mathematical (simulation) models automatically. Al...
Jeroen Keppens, Qiang Shen
TPDS
2002
104views more  TPDS 2002»
13 years 7 months ago
Composite Synchronization in Parallel Discrete-Event Simulation
This paper considers a technique for composing global (barrier-style) and local (channel scanning) synchronization protocols within a single parallel discrete-event simulation. Com...
David M. Nicol, Jason Liu