Sciweavers

946 search results - page 145 / 190
» Process Algebra and Non-Interference
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
ADCM
2010
59views more  ADCM 2010»
13 years 8 months ago
Sampling inequalities for infinitely smooth functions, with applications to interpolation and machine learning
Sampling inequalities give a precise formulation of the fact that a differentiable function cannot attain large values, if its derivatives are bounded and if it is small on a suff...
Christian Rieger, Barbara Zwicknagl
CORR
2008
Springer
162views Education» more  CORR 2008»
13 years 8 months ago
Accelerating Scientific Computations with Mixed Precision Algorithms
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit ...
Marc Baboulin, Alfredo Buttari, Jack Dongarra, Jak...
ENTCS
2008
135views more  ENTCS 2008»
13 years 8 months ago
Formal Specification Generation from Requirement Documents
Automatic generation of formal specifications from requirement reduces cost and complexity of formal models creation. Thus, the generated formal model brings the possibility to ca...
Gustavo Cabral, Augusto Sampaio
ENTCS
2008
99views more  ENTCS 2008»
13 years 8 months ago
A Categorical Model of the Fusion Calculus
We provide a categorical presentation of the Fusion calculus. Working in a suitable category of presheaves, we describe the syntax as initial algebra of a signature endofunctor, a...
Marino Miculan