Sciweavers

688 search results - page 77 / 138
» Computational Methods for Verification of Stochastic Hybrid ...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
SIAMSC
2008
150views more  SIAMSC 2008»
13 years 7 months ago
Asymptotic Stability of a Jump-Diffusion Equation and Its Numerical Approximation
Asymptotic linear stability is studied for stochastic differential equations (SDEs) that incorporate Poisson-driven jumps and their numerical simulation using Eulertype discretisa...
Graeme D. Chalmers, Desmond J. Higham
ACL
2009
13 years 5 months ago
Revisiting Pivot Language Approach for Machine Translation
This paper revisits the pivot language approach for machine translation. First, we investigate three different methods for pivot translation. Then we employ a hybrid method combin...
Hua Wu, Haifeng Wang
CPHYSICS
2006
204views more  CPHYSICS 2006»
13 years 7 months ago
Genetically controlled random search: a global optimization method for continuous multidimensional functions
A new stochastic method for locating the global minimum of a multidimensional function inside a rectangular hyperbox is presented. A sampling technique is employed that makes use ...
Ioannis G. Tsoulos, Isaac E. Lagaris
CADE
2005
Springer
14 years 8 months ago
Temporal Logics over Transitive States
Abstract. We investigate the computational behaviour of `two-dimensional' propositional temporal logics over (N, <) (with and without the next-time operator ?) that are cap...
Boris Konev, Frank Wolter, Michael Zakharyaschev