Sciweavers

144 search results - page 25 / 29
» Model checking the probabilistic pi-calculus
Sort
View
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 3 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
WCNC
2008
IEEE
14 years 1 months ago
Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks
Abstract— This paper explores integrated source-channel decoding, driven by wireless sensor network applications where correlated information acquired by the network is gathered ...
Sheryl L. Howard, Paul G. Flikkema
QEST
2008
IEEE
14 years 1 months ago
Hintikka Games for PCTL on Labeled Markov Chains
We present Hintikka games for formulae of the probabilistic temporal logic PCTL and countable labeled Markov chains as models, giving an operational account of the denotational se...
Harald Fecher, Michael Huth, Nir Piterman, Daniel ...
QEST
2006
IEEE
14 years 1 months ago
Safe On-The-Fly Steady-State Detection for Time-Bounded Reachability
The time-bounded reachability problem for continuoustime Markov chains (CTMCs) amounts to determine the probability to reach a (set of) goal state(s) within a given time span, suc...
Joost-Pieter Katoen, Ivan S. Zapreev
IPPS
2006
IEEE
14 years 1 months ago
Formal modeling and analysis of wireless sensor network algorithms in Real-Time Maude
Advanced wireless sensor network algorithms pose challenges to their formal modeling and analysis, such as modeling probabilistic and real-time behaviors and novel forms of commun...
Peter Csaba Ölveczky, Stian Thorvaldsen