Finite-state machine

Results: 655



#Item
51Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-02-06 15:50:38
52Modelling malignant progression with a finite state machine supports a two checkpoint theory of cancer

Modelling malignant progression with a finite state machine supports a two checkpoint theory of cancer

Add to Reading List

Source URL: www.biodiscoveryjournal.co.uk

Language: English - Date: 2015-02-15 18:10:56
53CV Filip Murlak Contact data address  University of Warsaw, Faculty of Mathematics, Informatics, and Mechanics

CV Filip Murlak Contact data address University of Warsaw, Faculty of Mathematics, Informatics, and Mechanics

Add to Reading List

Source URL: www.mimuw.edu.pl

Language: English - Date: 2013-05-22 15:22:06
54Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-02-06 15:50:08
55How to Efficiently Translate Extensions of Temporal Logics into Alternating Automata C´esar S´ anchez1,2 and Julian Samborski-Forlese1 1

How to Efficiently Translate Extensions of Temporal Logics into Alternating Automata C´esar S´ anchez1,2 and Julian Samborski-Forlese1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-06-27 10:56:07
56Security Applications of Formal Language Theory Dartmouth Computer Science Technical Report TR2011-709 Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina

Security Applications of Formal Language Theory Dartmouth Computer Science Technical Report TR2011-709 Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2011-12-01 11:57:54
57Automata and Logics for Concurrent Systems: Realizability and Verification Habilitation Thesis Mémoire d’Habilitation à Diriger des Recherches  submitted by

Automata and Logics for Concurrent Systems: Realizability and Verification Habilitation Thesis Mémoire d’Habilitation à Diriger des Recherches submitted by

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2015-07-17 03:24:58
582014 IEEE Security and Privacy Workshops  Finite State Machine Parsing for Internet Protocols: Faster Than You Think Peter C. Johnson Department of Computer Science

2014 IEEE Security and Privacy Workshops Finite State Machine Parsing for Internet Protocols: Faster Than You Think Peter C. Johnson Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:10:41
    592014 IEEE Security and Privacy Workshops  Finite State Machine Parsing for Internet Protocols: Faster Than You Think Peter C. Johnson Department of Computer Science

    2014 IEEE Security and Privacy Workshops Finite State Machine Parsing for Internet Protocols: Faster Than You Think Peter C. Johnson Department of Computer Science

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2014-04-30 03:10:41
      60A Pattern-Based Approach to Parametric Specification Mining Giles Reger , Howard Barringer, David Rydeheard University of Manchester  Abstract—This paper presents a technique for using execution

      A Pattern-Based Approach to Parametric Specification Mining Giles Reger , Howard Barringer, David Rydeheard University of Manchester Abstract—This paper presents a technique for using execution

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2013-09-02 06:11:57