AC

Results: 359273



#Item
321Mathematics / Electromagnetism / Electric power / Electrical engineering / Power engineering / Power-flow study / Parameter / Variable

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

Add to Reading List

Source URL: scungao.github.io

Language: English - Date: 2018-09-27 16:37:21
322Theoretical computer science / Formal methods / Mathematics / Logic in computer science / Mathematical logic / Automated theorem proving / School of Computer Science /  University of Manchester / Automated reasoning / Formal verification / E theorem prover / IP / Satisfiability modulo theories

Testing a Saturation-Based Theorem Prover: Experiences and Challenges? Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,3,4 1 3

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-31 05:29:21
323Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
324Theoretical computer science / Mathematical logic / Mathematics / Boolean algebra / Logic in computer science / Electronic design automation / Formal methods / NP-complete problems / Boolean satisfiability problem / Satisfiability modulo theories / Propositional calculus / Model checking

Verification Using SAT and SMT Solvers1 N. Shankar Computer Science Laboratory SRI International Menlo Park, CA

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-25 09:00:40
325Temporal logic / Theoretical computer science / Mathematical analysis / Linear temporal logic / Mathematics / Computation tree logic / Omega language / Distribution

Quantitative Multi-Objective Verification for Probabilistic Systems Vojtˇech Forejt1 , Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-01-11 18:39:29
326Theoretical computer science / Temporal logic / Logic in computer science / Linear temporal logic / Finite automata / PRISM model checker / Randomized algorithm / Computation tree logic / PP / Model checking / Formal verification / Probabilistic automaton

Assume-Guarantee Verification for Probabilistic Systems Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2010-04-16 06:37:28
327Geometry / Space / Mathematics / Riemann surfaces / Bernhard Riemann / Geometric topology / Riemannian geometry / Uniformization theorem / Conformal map / Differential geometry of surfaces / Conformal geometry / Unit disk

Uniformization and percolation Itai Benjamini October 2015 Conformal maps

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2015-09-29 04:31:44
328

Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes Tom´asˇ Br´azdil V´aclav Broˇzek

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-12-07 04:04:14
    329Information theory / Information flow / Mutual information / Conditional mutual information / Conditional entropy

    Automatically Calculating Quantitative Integrity Measures for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1 2

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    330Cryptography / Public-key cryptography / Digital signature / IP / Soundness / Group signature / Post-quantum cryptography / Designated verifier signature / Computational complexity theory

    Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2016-09-01 06:28:04
    UPDATE