Sciweavers

336 search results - page 16 / 68
» Monitoring modulo theories
Sort
View
JCP
2007
104views more  JCP 2007»
13 years 9 months ago
Cyclic Convolution Algorithm Formulations Using Polynomial Transform Theory
— This work presents a mathematical framework for the development of efficient algorithms for cyclic convolution computations. The framework is based on the Chinese Reminder Theo...
Abraham H. Diaz-Perez, Domingo Rodríguez
SECURWARE
2008
IEEE
14 years 4 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
WOLLIC
2010
Springer
14 years 2 months ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
14 years 3 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 1 months ago
The Theory of Intervention Games for Resource Sharing in Wireless Communications
This paper develops a game-theoretic framework for the design and analysis of a new class of incentive schemes called intervention schemes. We formulate intervention games, propos...
Jaeok Park, Mihaela van der Schaar