Sciweavers

1018 search results - page 149 / 204
» Generative unbinding of names
Sort
View
APN
2008
Springer
13 years 11 months ago
MC-SOG: An LTL Model Checker Based on Symbolic Observation Graphs
Model checking is a powerful and widespread technique for the verification of finite distributed systems. However, the main hindrance for wider application of this technique is the...
Kais Klai, Denis Poitrenaud
DAWAK
2008
Springer
13 years 11 months ago
Mining Serial Episode Rules with Time Lags over Multiple Data Streams
The problem of discovering episode rules from static databases has been studied for years due to its wide applications in prediction. In this paper, we make the first attempt to st...
Tung-Ying Lee, En Tzu Wang, Arbee L. P. Chen
ESORICS
2008
Springer
13 years 11 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
CMS
2010
138views Communications» more  CMS 2010»
13 years 10 months ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl
IJCAI
2007
13 years 10 months ago
A Bayesian Computational Cognitive Model
Computational cognitive modeling has recently emerged as one of the hottest issues in the AI area. Both symbolic approaches and connectionist approaches present their merits and d...
Zhiwei Shi, Hong Hu, Zhongzhi Shi