Sciweavers

293 search results - page 36 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
EMSOFT
2006
Springer
13 years 11 months ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
ACISP
2006
Springer
14 years 1 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ICML
2005
IEEE
14 years 8 months ago
Proto-value functions: developmental reinforcement learning
This paper presents a novel framework called proto-reinforcement learning (PRL), based on a mathematical model of a proto-value function: these are task-independent basis function...
Sridhar Mahadevan
SMC
2007
IEEE
143views Control Systems» more  SMC 2007»
14 years 1 months ago
Enabling gestural interaction by means of tracking dynamical systems models and assistive feedback
— The computational understanding of continuous human movement plays a significant role in diverse emergent applications in areas ranging from human computer interaction to phys...
Yon Visell, Jeremy R. Cooperstock
CIKM
2008
Springer
13 years 9 months ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...