Sciweavers

323 search results - page 45 / 65
» Verifying the Mondex Case Study
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 4 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
SEFM
2005
IEEE
14 years 3 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
14 years 3 months ago
Learned mutation strategies in genetic programming for evolution and adaptation of simulated snakebot
In this work we propose an approach of incorporating learned mutation strategies (LMS) in genetic programming (GP) employed for evolution and adaptation of locomotion gaits of sim...
Ivan Tanev
ICICS
2005
Springer
14 years 3 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
ICFEM
2004
Springer
14 years 3 months ago
Timed Patterns: TCOZ to Timed Automata
Abstract. The integrated logic-based modeling language, Timed Communicating Object Z (TCOZ), is well suited for presenting complete and coherent requirement models for complex real...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...