Sciweavers

2687 search results - page 122 / 538
» Formal Analysis of PKCS
Sort
View
ICCS
2001
Springer
15 years 8 months ago
Many-Valued Context Analysis Using Descriptions
Abstract. We propose an approach to many-valued contexts using formal descriptions instead of scaling. The underlying idea is the philosphical definition of a concept as a set of ...
Ralf Gugisch
EICS
2009
ACM
15 years 10 months ago
A bisimulation-based approach to the analysis of human-computer interaction
This paper discusses the use of formal methods for analysing human-computer interaction. We focus on the mode confusion problem that arises whenever the user thinks that the syste...
Sébastien Combéfis, Charles Pecheur
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
15 years 10 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CSFW
2005
IEEE
15 years 9 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov