Sciweavers

118 search results - page 21 / 24
» Worst-case analysis of discrete systems based on conditional...
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IEEEHPCS
2010
13 years 5 months ago
No more crash or crunch: Sustainable credit dynamics in a P2P community
Abstract—Many peer-to-peer file sharing communities implement credit policies to incentivise users to contribute upload resources. Such policies implicitly assume a user model -...
Rameez Rahman, David Hales, Tamas Vinko, Johan A. ...
BIRTHDAY
2010
Springer
14 years 4 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
FM
2009
Springer
155views Formal Methods» more  FM 2009»
14 years 1 months ago
Towards an Operational Semantics for Alloy
Abstract. The Alloy modeling language has a mathematically rigorous denotational semantics based on relational algebra. Alloy specifications often represent operations on a state,...
Theophilos Giannakopoulos, Daniel J. Dougherty, Ka...
ICLP
2010
Springer
13 years 11 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López