Sciweavers

623 search results - page 110 / 125
» Declarative Network Verification
Sort
View
FORMATS
2008
Springer
13 years 10 months ago
Comparing the Expressiveness of Timed Automata and Timed Extensions of Petri Nets
Time dependant models have been intensively studied for many reasons, among others because of their applications in software verification and due to the development of embedded pla...
Jirí Srba
CSREASAM
2008
13 years 10 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
LREC
2010
221views Education» more  LREC 2010»
13 years 10 months ago
KALAKA: A TV Broadcast Speech Database for the Evaluation of Language Recognition Systems
A speech database, named KALAKA, was created to support the Albayzin 2008 Evaluation of Language Recognition Systems, organized by the Spanish Network on Speech Technologies from ...
Luis Javier Rodríguez-Fuentes, Mikel Pe&nti...
DAGSTUHL
2008
13 years 10 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb
FORTE
2008
13 years 10 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...