Sciweavers

336 search results - page 19 / 68
» Monitoring modulo theories
Sort
View
ENTCS
2002
95views more  ENTCS 2002»
13 years 9 months ago
Deriving Bisimulation Congruences: A 2-categorical Approach
We introduce G-relative-pushouts (GRPO) which are a 2-categorical generalisation of relative-pushouts (RPO). They are suitable for deriving labelled transition systems (LTS) for p...
Vladimiro Sassone, Pawel Sobocinski
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 7 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
IANDC
2008
105views more  IANDC 2008»
13 years 10 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
APAL
2010
124views more  APAL 2010»
13 years 10 months ago
The effective theory of Borel equivalence relations
The study of Borel equivalence relations under Borel reducibility has developed into an important area of descriptive set theory. The dichotomies of Silver ([19]) and Harrington-K...
Ekaterina B. Fokina, Sy-David Friedman, Asger T&ou...
TR
2010
140views Hardware» more  TR 2010»
13 years 4 months ago
Modeling Failure Modes for Residual Life Prediction Using Stochastic Filtering Theory
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Matthew J. Carr, Wenbin Wang