Sciweavers

2687 search results - page 198 / 538
» Formal Analysis of PKCS
Sort
View
ISICT
2003
15 years 6 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
CACM
2010
105views more  CACM 2010»
15 years 4 months ago
Automatic program repair with evolutionary computation
Therearemanymethodsfordetectingandmitigatingsoftware errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work ...
Westley Weimer, Stephanie Forrest, Claire Le Goues...
AROBOTS
2006
119views more  AROBOTS 2006»
15 years 4 months ago
A Discussion of Simultaneous Localization and Mapping
This paper aims at a discussion of the structure of the SLAM problem. The analysis is not strictly formal but based both on informal studies and mathematical derivation. The first ...
Udo Frese
JAPLL
2008
88views more  JAPLL 2008»
15 years 4 months ago
Living up to one's commitments: Agency, strategies and trust
In human social interaction, the notions of commitment and trust are strongly interrelated. A formal model for this interrelation will enable artificial agents to benefit from the...
Thomas Müller
146
Voted
GEOINFORMATICA
2002
100views more  GEOINFORMATICA 2002»
15 years 4 months ago
Vagueness and Rough Location
This paper deals with the representation and the processing of information about spatial objects with indeterminate location like valleys or dunes (objects subject to vagueness). ...
Thomas Bittner, John G. Stell