Sciweavers

323 search results - page 16 / 65
» Verifying the Mondex Case Study
Sort
View
KI
1999
Springer
14 years 2 months ago
Revising Nonmonotonic Theories: The Case of Defeasible Logic
Abstract. The revision and transformation of knowledge is widely recognized as a key issue in knowledge representation and reasoning. Reasons for the importance of this topic are t...
David Billington, Grigoris Antoniou, Guido Governa...
WWW
2006
ACM
14 years 10 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
FSEN
2007
Springer
14 years 4 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
ASPDAC
2004
ACM
78views Hardware» more  ASPDAC 2004»
14 years 3 months ago
On compliance test of on-chip bus for SOC
- In this paper, we employ a monitor-based approach for on-chip bus (OCB) compliance test. To describe the OCB protocols,we proposea FSM model, which can help to extract the necess...
Hue-Min Lin, Chia-Chih Yen, Che-Hua Shih, Jing-Yan...
CANDC
2004
ACM
13 years 9 months ago
The difficult interpretation of transcriptome data: the case of the GATC regulatory network
Genomic analyses on part of Escherichia coli's chromosome had suggested the existence of a GATC regulated network. This has recently been confirmed through a transcriptome an...
Alessandra Riva, Marie-Odile Delorme, Tony Chevali...