The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating...
The computer vision research aims to enable computer to recognize images as easily as human. Human can segregate target from its surrounding environment, which is associated with human memory mechanism. However, it is not quite clear about how the visual images are stored and retrieved in the human brain. This paper attempts to introduce the REM (Retrieving Effective from Memory) model into image...
In the traditional cockpit display-control system, pilots have to face more and more instruments and response to the complex information simultaneously. In order to study the change characteristics of the mental workload under such multi-task condition, take the virtual instruments for design objects to set up a series of tasks. With the increase of information quantity and frequency of m instruments,...
State explosion problem is the main obstacle of model checking. In this work, we address this problem from a co algebraic point of view. We establish an effective method to prove uniformly the existence of the smallest Kripke structure with respect to bisimilarity, which describes all behaviors of the Kripke structures with no redundancy. We show this smallest Kripke structure generates a minimal...
Simulation-based functional validation is still one of the primary approaches for verifying designs described in hardware description languages. Traditional code coverage metrics do not address the observability issue and may overestimate the extent of functional validation. Observability-based code coverage metric (OCCOM) is the first code coverage metric considering the essential observability issue...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.