Sciweavers

5255 search results - page 50 / 1051
» Formal Methods for Privacy
Sort
View
AGENTS
2001
Springer
14 years 1 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen
SAFECOMP
2007
Springer
14 years 4 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
IEEEARES
2009
IEEE
14 years 4 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
ZUM
1994
Springer
147views Formal Methods» more  ZUM 1994»
14 years 2 months ago
Integrating Formal Methods into a Professional Master of Software Engineering Program
A critical issuein the designof aprofessionalsoftware engineeringdegreeprogram is the way in which formal methods are integrated into the curriculum. The approach taken by most pr...
David Garlan
PERCOM
2007
ACM
14 years 9 months ago
Defining Strong Privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is threefold: (1) We propose a simple, formal definition of strong privacy usef...
Ari Juels, Stephen A. Weis