Sciweavers

134 search results - page 26 / 27
» Formal Software Development in the Verification Support Envi...
Sort
View
COMPSAC
2009
IEEE
14 years 6 days ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
AISC
1998
Springer
13 years 9 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson
UIST
1993
ACM
13 years 9 months ago
Model-based User Interface Design by Example and by Interview
Model-based user interface design is centered around a description of application objects and operations at a level of ion higher than that of code. A good model can be used to su...
Martin R. Frank, James D. Foley
SSR
2001
104views more  SSR 2001»
13 years 6 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
W4A
2005
ACM
13 years 11 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userâ€...
Pythagoras Karampiperis, Demetrios G. Sampson