Sciweavers

2346 search results - page 163 / 470
» Hierarchical State Machines
Sort
View
ICDCS
2007
IEEE
14 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
CBMS
2006
IEEE
14 years 4 months ago
Machine Learning Techniques to Enable Closed-Loop Control in Anesthesia
The growing availability of high throughput measurement devices in the operating room makes possible the collection of a huge amount of data about the state of the patient and the...
Olivier Caelen, Gianluca Bontempi, Eddy Coussaert,...
CSFW
2006
IEEE
14 years 4 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
APLAS
2006
ACM
14 years 4 months ago
A Pushdown Machine for Recursive XML Processing
XML transformations are most naturally defined as recursive functions on trees. Their direct implementation, however, causes inefficient memory usage because the input XML tree is...
Keisuke Nakano, Shin-Cheng Mu
PPPJ
2006
ACM
14 years 4 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...