Sciweavers

529 search results - page 49 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
IS
2008
13 years 7 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
ESORICS
2008
Springer
13 years 9 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
ICRA
2005
IEEE
115views Robotics» more  ICRA 2005»
14 years 1 months ago
Real-time and Precise Self Collision Detection System for Humanoid Robots
— In this paper, we describe the real-time and precise self collision detection system that does not reduce the number of polygons and checks more than 100 collision pairs in rea...
Kei Okada, Masayuki Inaba, Hirochika Inoue
IPPS
2007
IEEE
14 years 2 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet