|
|
SCSS 2017: Author IndexAuthor | Papers |
---|
A | Abid, Chiheb Ameur | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | Andrianarivelo, Nirina | Transforming Prefix-constrained or Controlled Rewrite Systems | B | Ben Youssef, Nihel | Automatic detection and correction of firewall misconfigurations- A formal approach | Bhateja, Puneet | Asynchronous testing of real-time systems | Bouhoula, Adel | Automatic detection and correction of firewall misconfigurations- A formal approach Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | Boussabbeh, Maha | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | Brenas, Jon Hael | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | C | Cerna, David | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications | E | Echahed, Rachid | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | Evina, Pierrette Annie | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems | H | Hadj Kacem, Ahmed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | Haeri, Seyed Hossein | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage | Hamdi, Mohamed | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors | I | Ida, Tetsuo | Origami folds in higher-dimension | J | Jaidi, Faouzi | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | K | Kim, Tai-Hoon | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors | Klai, Kais | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | L | Labbene Ayachi, Faten | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | M | Mosbah, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | O | Ouni, Hiba | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | P | Pelletier, Vivien | Transforming Prefix-constrained or Controlled Rewrite Systems | R | Réty, Pierre | Transforming Prefix-constrained or Controlled Rewrite Systems | S | Saâdaoui, Amina | Automatic detection and correction of firewall misconfigurations- A formal approach | Schreiner, Wolfgang | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications | Schupp, Sibylle | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage | Strecker, Martin | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | T | Tounsi, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | W | Watt, Stephen | Origami folds in higher-dimension | Z | Zouari, Belhassen | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | Zouari, Jaweher | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
|
|
|