• Aucun résultat trouvé

[PDF] Top 20 Information Hiding in Probabilistic Concurrent Systems (journal version)

Has 10000 "Information Hiding in Probabilistic Concurrent Systems (journal version)" found on our website. Below are the top 20 most common "Information Hiding in Probabilistic Concurrent Systems (journal version)".

Information Hiding in Probabilistic Concurrent Systems (journal version)

Information Hiding in Probabilistic Concurrent Systems (journal version)

... • We illustrate the problem with full-information schedulers in security, our solution providing admissible schedulers, and the application of our proving technique by means of the well [r] ... Voir le document complet

33

Metrics for Differential Privacy in Concurrent Systems

Metrics for Differential Privacy in Concurrent Systems

... protection in the context of statisti- cal databases, differential privacy is now widely adopted in various models of ...computation. In this paper we investigate techniques for proving differential ... Voir le document complet

23

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

... with probabilistic phenomena arises in many fields in Computer ...formalizing probabilistic properties. The formal treatment of probabilistic phenomena is particularly difficult ... Voir le document complet

159

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

... utility In this se tion we show that,in some spe ial ases, the fa t that K provides ǫ -dierential priva y indu es a bound on the utility as dened in terms of a binary gain fun ..., in su h a ... Voir le document complet

190

Diagnosis in Infinite-State Probabilistic Systems

Diagnosis in Infinite-State Probabilistic Systems

... probabilistic systems. A natural way of modelling partially observable systems consists in introducing probabilities ...called probabilistic labelled transition systems (pLTS) ... Voir le document complet

16

Controlling information in probalistic systems

Controlling information in probalistic systems

... consists in, given a model of a system, verifying if it satisfies a property, often given by a logical ...interested in branching ...here. In LTL, one can encode formulae about the future of a run, ... Voir le document complet

255

Active diagnosis for probabilistic systems

Active diagnosis for probabilistic systems

... event systems was introduced in [SSL + 95], and can be described as follows: a labeled transition system performs a run, which may contain some specific events called ...gets information about the ... Voir le document complet

25

Fault Ascription in Concurrent Systems

Fault Ascription in Concurrent Systems

... Several approaches use [11] to encode and analyze execution traces. [2] determines potential causes for the first violation of an LTL formula by a trace. As [11] only considers a propositional setting without any ... Voir le document complet

20

Foundation of Diagnosis and Predictability in Probabilistic Systems

Foundation of Diagnosis and Predictability in Probabilistic Systems

... define in the sequel will have two important properties: soundness and ...the information provided is accurate and reactivity specifies which pieces of information the diagnoser must ...verdict ... Voir le document complet

13

Quantitative Approaches to Information Hiding

Quantitative Approaches to Information Hiding

... step in the connection between informa- tion flow models and Shannon information theory, by establishing a formal analogy between noninterference and mutual ...]. In his approach, the random variable ... Voir le document complet

114

Compositional methods for information-hiding

Compositional methods for information-hiding

... result. In its most general formulation, the DC consists of a multigraph where one of the nodes (cryptographers) may be secretly designated to pay for the ...a probabilistic coin, with two possible, ... Voir le document complet

28

Noninterference for Concurrent Programs and Thread Systems

Noninterference for Concurrent Programs and Thread Systems

... Unité de recherche INRIA Sophia Antipolis 2004, route des Lucioles - BP 93 - 06902 Sophia Antipolis Cedex France Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois - [r] ... Voir le document complet

29

Dynamically Consistent Preferences Under Imprecise Probabilistic Information

Dynamically Consistent Preferences Under Imprecise Probabilistic Information

... objective information, we adapt two further axioms from GHTV to our dynamic setting, namely Reduction (under precise information) and Local ...resolved in the next period and if one act is preferable ... Voir le document complet

22

Information Systems and Web Information Systems: A Methodological Perspective

Information Systems and Web Information Systems: A Methodological Perspective

... Finally, in the behavioural perspective, the attempt is to identify the interesting events that occur in the real world, the information affected by their occurrence and the functions that cause this ... Voir le document complet

12

Integrating spatial information into probabilistic relational model

Integrating spatial information into probabilistic relational model

... variables in that the former results into spatial objects ...directly in PRMs because of acyclicity constraint [16], we present our idea of modeling spatial autocorrelation by introducing (or deriving) ... Voir le document complet

9

Latency-based probabilistic information processing in a learning feedback hierarchy

Latency-based probabilistic information processing in a learning feedback hierarchy

... B. Related work There exists a large body of literature[5], [4], [8], [12], [4], [6], [7] on probabilistic aspects of neural coding. Most authors explicitly assume that neural population activity is related to ... Voir le document complet

8

Concurrent Systems Need Both Sequences And Serializers

Concurrent Systems Need Both Sequences And Serializers

... DRAFT February 1979 26 Sequences and Serializers The above definition shows how serializers subsume the ability of cells to efficiently implement synchronization and s[r] ... Voir le document complet

36

A probabilistic model to exploit user expectations in XML information retrieval

A probabilistic model to exploit user expectations in XML information retrieval

... of information depends on the query and cannot be actually considered as ...position in the document and its path ...appear in the beginning of the document and are not likely to be nested in ... Voir le document complet

20

Concurrent Synaptic and Systems Memory Consolidation during Sleep

Concurrent Synaptic and Systems Memory Consolidation during Sleep

... changes in brain re- sponses associated with recollection were linearly related to the changes in SOP during Q1 from baseline to test night in the right mPFC and left parahippocampal gyrus (PHG) ... Voir le document complet

10

Secure architecture for information systems in avionics

Secure architecture for information systems in avionics

... Keywords-avionic information system; dependability; secu- rity; execution model; virtualization; ...NTRODUCTION In avionics, each software component has its own level of ...developed in accordance ... Voir le document complet

8

Show all 10000 documents...