Sciweavers

509 search results - page 101 / 102
» On the completeness of compositional reasoning methods
Sort
View
CSFW
2002
IEEE
13 years 10 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
ASPLOS
1998
ACM
13 years 10 months ago
Compiler-Controlled Memory
Optimizations aimed at reducing the impact of memory operations on execution speed have long concentrated on improving cache performance. These efforts achieve a reasonable level...
Keith D. Cooper, Timothy J. Harvey
DBPL
1993
Springer
89views Database» more  DBPL 1993»
13 years 9 months ago
Database Programming in Transaction Logic
This paper presents database applications of the recently proposed Transaction Logic—an extension of classical predicate logic that accounts in a clean and declarative fashion f...
Anthony J. Bonner, Michael Kifer, Mariano P. Conse...
ECRTS
2007
IEEE
13 years 9 months ago
Statistical QoS Guarantee and Energy-Efficiency in Web Server Clusters
In this paper we study the soft real-time web cluster architecture needed to support e-commerce and related applications. Our testbed is based on an industry standard, which defin...
Luciano Bertini, Julius C. B. Leite, Daniel Moss&e...
ATAL
2008
Springer
13 years 7 months ago
A model of gaze for the purpose of emotional expression in virtual embodied agents
Currently, state of the art virtual agents lack the ability to display emotion as seen in actual humans, or even in hand-animated characters. One reason for the emotional inexpres...
Brent J. Lance, Stacy Marsella