Sciweavers

2687 search results - page 187 / 538
» Formal Analysis of PKCS
Sort
View
146
Voted
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 9 months ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
EDCC
2010
Springer
15 years 9 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...
ACSAC
1999
IEEE
15 years 8 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
115
Voted
AE
1997
Springer
15 years 8 months ago
An Analysis of Punctuated Equilibria in Simple Genetic Algorithms
In the running of a genetic algorithm, the population is liable to be con ned in the local optimum, that is the metastable state, making an equilibrium. It is known that, after a l...
Sang-Yeop Oh, Hyunsoo Yoon
CIA
2006
Springer
15 years 8 months ago
Agent-Based Analysis and Support for Incident Management
This paper presents an agent-based approach for error detection in incident management organizations. The approach consists of several parts. First, a formal approach for the speci...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur, ...