Sciweavers

993 search results - page 160 / 199
» The Complexity of Probabilistic EL
Sort
View
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 21 days ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
CAV
2001
Springer
154views Hardware» more  CAV 2001»
14 years 18 days ago
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM
We consider the randomized consensus protocol of Aspnes and Herlihy for achieving agreement among N asynchronous processes that communicate via read/write shared registers. The alg...
Marta Z. Kwiatkowska, Gethin Norman, Roberto Segal...
INFOCOM
1995
IEEE
14 years 15 days ago
Automatic Alarm Correlation for Fault Identification
In communication networks, a large number of alarms exist to signal any abnormal behavior of the network. As network faults typically result in a number of alarms, correlating the...
Isabelle Rouvellou, George W. Hart
AAAI
2008
13 years 11 months ago
Computing Minimal Diagnoses by Greedy Stochastic Search
Most algorithms for computing diagnoses within a modelbased diagnosis framework are deterministic. Such algorithms guarantee soundness and completeness, but are P 2 hard. To overc...
Alexander Feldman, Gregory M. Provan, Arjan J. C. ...
MOBISYS
2007
ACM
13 years 11 months ago
A resource optimized physical movement monitoring scheme for environmental and on-body sensor networks
— Perhaps the most significant challenge in design of on-body sensors is the wearability concern. This concern requires that the size of the nodes (sensors, processing units and ...
Antti Vehkaoja, Mari Zakrzewski, Jukka Lekkala, Sa...