Sciweavers

68 search results - page 4 / 14
» Impossibility Results for the Equational Theory of Timed CCS
Sort
View
CCS
2004
ACM
14 years 28 days ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
CDC
2009
IEEE
137views Control Systems» more  CDC 2009»
13 years 11 months ago
Control of ramp-up current profile dynamics in tokamak plasmas via the minimal-surface theory
The central task of current profile control during the ramp-up phase of a tokamak discharge is to find the actuator trajectories that are necessary to achieve certain desired curre...
Chao Xu, Eugenio Schuster
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 5 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
CCS
2005
ACM
14 years 1 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
CVPR
2005
IEEE
14 years 9 months ago
Active Polyhedron: Surface Evolution Theory Applied to Deformable Meshes
This paper presents a novel 3D deformable surface that we call an active polyhedron. Rooted in surface evolution theory, an active polyhedron is a polyhedral surface whose vertice...
Gregory G. Slabaugh, Gozde B. Unal