.ac

Results: 359273



#Item
321Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

Add to Reading List

Source URL: scungao.github.io

Language: English - Date: 2018-09-27 16:37:21
322Testing a Saturation-Based Theorem Prover: Experiences and Challenges? Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,3,4 1  3

Testing a Saturation-Based Theorem Prover: Experiences and Challenges? Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,3,4 1 3

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-31 05:29:21
323A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
324Verification Using SAT and SMT Solvers1 N. Shankar Computer Science Laboratory SRI International Menlo Park, CA

Verification Using SAT and SMT Solvers1 N. Shankar Computer Science Laboratory SRI International Menlo Park, CA

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-25 09:00:40
325Quantitative Multi-Objective Verification for Probabilistic Systems Vojtˇech Forejt1 , Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Quantitative Multi-Objective Verification for Probabilistic Systems Vojtˇech Forejt1 , Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-01-11 18:39:29
326Assume-Guarantee Verification for Probabilistic Systems Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Assume-Guarantee Verification for Probabilistic Systems Marta Kwiatkowska1 , Gethin Norman2 , David Parker1 , and Hongyang Qu1 1 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2010-04-16 06:37:28
327Uniformization and percolation Itai Benjamini October 2015  Conformal maps

Uniformization and percolation Itai Benjamini October 2015 Conformal maps

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2015-09-29 04:31:44
328Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes Tom´asˇ Br´azdil V´aclav Broˇzek

Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes Tom´asˇ Br´azdil V´aclav Broˇzek

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-12-07 04:04:14
    329Automatically Calculating Quantitative Integrity Measures for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1  2

    Automatically Calculating Quantitative Integrity Measures for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1 2

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    330Short	
  Accountable	
  Ring	
   Signatures Based	
  on	
  DDH Jonathan	
  Bootle,	
  Andrea	
  Cerulli,	
  Pyrros Chaidos,	
  Essam Ghadafi,	
   Jens	
  Groth,	
  and	
  Christophe	
  Petit	
  

    Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2016-09-01 06:28:04