Sciweavers

623 search results - page 78 / 125
» Declarative Network Verification
Sort
View
EJWCN
2010
122views more  EJWCN 2010»
13 years 3 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 14 days ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
CIBB
2008
13 years 10 months ago
Splice Site Prediction Using Artificial Neural Networks
A system for utilizing an artificial neural network to predict splice sites in genes has been studied. The neural network uses a sliding window of nucleotides over a gene and predi...
Øystein Johansen, Tom Ryen, Trygve Eftest&o...
PODC
2011
ACM
12 years 11 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
SIMUTOOLS
2008
13 years 10 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...