Sciweavers

2043 search results - page 46 / 409
» Reasoning About Security Models
Sort
View
IJCAI
1993
13 years 11 months ago
A Computational Model of Tractable Reasoning - Taking Inspiration from Cognition
Polynomial time complexity is the usual ‘threshold’ for distinguishing the tractable from the intractable and it may seem reasonable to adopt this notion of tractability in th...
Lokendra Shastri
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 2 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
AAAI
1998
13 years 11 months ago
Multimodal Reasoning for Automatic Model Construction
This paper describes a program called Pret that automates system identification, the process of finding a dynamical model of a black-box system. Pret performs both structural iden...
Reinhard Stolle, Elizabeth Bradley
ECOI
2008
84views more  ECOI 2008»
13 years 10 months ago
Towards a structured approach to building qualitative reasoning models and simulations
Successful transfer and uptake of qualitative reasoning technology for modelling and simulation in a variety of domains has been hampered by the lack of a structured methodology t...
Bert Bredeweg, Paulo Salles, Anders Bouwer, Jochem...
FORTE
2009
13 years 8 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...