Simon

Results: 12846



#Item
1Formal methods / Logic puzzles / River crossing puzzle / CH / Alloy / Software engineering / Theoretical computer science

DYNALLOY: AN EXTENSION OF ALLOY FOR WRITING AND ANALYZING BEHAVIOURAL MODELS Germán Regis | César Cornejo | Simón Gutiérrez Brida | Mariano Politano | Fernando Raverta | Pablo Ponzio | Nazareno Aguirre | Juan Pablo G

Add to Reading List

Source URL: alloytools.org

Language: English - Date: 2018-06-13 06:07:43
2Theoretical computer science / Formal methods / Mathematical logic / Logic in computer science / Mathematics / Constraint programming / Automated theorem proving / Satisfiability modulo theories / Formal verification / Type theory / First-order logic / Vampire

Making Automatic Theorem Provers more Versatile Simon Cruanes Veridis, Inria Nancy https://cedeela.fr/~simon/ August 2017

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-08-08 03:28:32
3Biometrics / Security engineering / Cryptography / Computing / Identification / Machine learning / Surveillance / Security / Keystroke dynamics / Type I and type II errors / Password / Data corruption

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:46:45
4Security engineering / Biometrics / Cryptography / Prevention / Surveillance / Security / Identification / Authentication / Facial recognition system / Password / Computer security / Replay attack

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts Simon Eberz∗ , Giulio Lovisotto∗ , Andrea Patan`e∗ , Marta Kwiatkowska∗ , Vincent Lenders† and Ivan Ma

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2018-04-03 02:53:51
5

The Jury Is In: Monolithic OS Design Is Flawed Microkernel-based Designs Improve Security Simon Biggs, Damon Lee,

Add to Reading List

Source URL: ts.data61.csiro.au

Language: English - Date: 2018-08-30 11:33:29
    6Finite automata / Temporal logic / Model checking / Theoretical computer science / Formal methods / Mathematical logic / Linear temporal logic / Computation tree logic / Alternating finite automaton / Generalized Bchi automaton / Bchi automaton

    Verifying the LTL to B¨ uchi Automata Translation via Very Weak Alternating Automata Simon Jantsch1 and Michael Norrish2 1

    Add to Reading List

    Source URL: cakeml.org

    Language: English - Date: 2018-05-17 00:58:55
    7Landscape / Urban planning / Natural environment / Sustainability / Sustainable city / Urban park / Park / Human behavior / Nature

    U R B A N PA R K S Communal spaces for greater sustainability Photographic artist Simon Roberts says that cities have gradually opened up more of their private land for public use, driven by the

    Add to Reading List

    Source URL: perspectives.pictet.com

    Language: English - Date: 2018-06-25 04:42:03
    8Program analysis / Software engineering / Computer programming / Programming language implementation / Static program analysis / Compiler construction / Data-flow analysis / Syntax / Definite assignment analysis / Compiler / DFG / Pointer analysis

    An Extensible Framework for Variable-Precision Data-Flow Analyses in MPS Tamás Szabó Simon Alperovich

    Add to Reading List

    Source URL: mbeddr.com

    Language: English - Date: 2018-08-02 04:06:51
    9Mathematical logic / Theoretical computer science / Automated theorem proving / Mathematics / Proof theory / Logic in computer science / Formal methods / Automated reasoning / Proof assistant / Proof complexity / Reasoning system / Isabelle

    System Description: GAPT 2.0? Gabriel Ebner1 , Stefan Hetzl1 , Giselle Reis2 , Martin Riener3 , Simon Wolfsteiner1 , and Sebastian Zivota1 1 Vienna University of Technology

    Add to Reading List

    Source URL: www.logic.at

    Language: English - Date: 2018-07-19 05:32:19
    10Security engineering / Biometrics / Cryptography / Prevention / Surveillance / Security / Identification / Authentication / Facial recognition system / Password / Computer security / Replay attack

    When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts Simon Eberz∗ , Giulio Lovisotto∗ , Andrea Patan`e∗ , Marta Kwiatkowska∗ , Vincent Lenders† and Ivan Ma

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-06-20 05:17:28
    UPDATE