Sciweavers

ENTCS
2007
120views more  ENTCS 2007»
13 years 5 months ago
Local Reasoning about Data Update
We present local Hoare reasoning about data update, using Context Logic for analysing structured data. We apply our reasoning to tree update, heap update which is analogous to loc...
Cristiano Calcagno, Philippa Gardner, Uri Zarfaty
ENTCS
2007
108views more  ENTCS 2007»
13 years 5 months ago
Remarks on Testing Probabilistic Processes
We develop a general testing scenario for probabilistic processes, giving rise to two theories: probabilistic may testing and probabilistic must testing. These are applied to a si...
Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy,...
ENTCS
2007
101views more  ENTCS 2007»
13 years 5 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts
ENTCS
2007
110views more  ENTCS 2007»
13 years 5 months ago
Algorithmic Techniques for Maintaining Shortest Routes in Dynamic Networks
In this paper, we survey algorithms for shortest paths in dynamic networks. Although research on this problem spans over more than three decades, in the last couple of years many ...
Camil Demetrescu, Giuseppe F. Italiano
ENTCS
2007
90views more  ENTCS 2007»
13 years 5 months ago
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Walid Bagga, Stefano Crosta, Pietro Michiardi, Ref...
ENTCS
2007
95views more  ENTCS 2007»
13 years 5 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
ENTCS
2007
83views more  ENTCS 2007»
13 years 5 months ago
On Dynamic Distribution of Private Keys over MANETs
Vanesa Daza, Paz Morillo, Carla Ràfols
ENTCS
2007
131views more  ENTCS 2007»
13 years 5 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
ENTCS
2007
94views more  ENTCS 2007»
13 years 5 months ago
On the Security of Tag-KEM for Signcryption
Signcryption tag-KEM (Key Encapsulation Mechanism with a tag) is an authenticated tag-KEM for generic construction of hybrid signcryption. Signcryption tagKEM allows the sender to...
Maki Yoshida, Toru Fujiwara
ENTCS
2007
174views more  ENTCS 2007»
13 years 5 months ago
Quantum Patterns and Types for Entanglement and Separability
As a first step toward a notion of quantum data structures, we introduce a typing system for reflecting entanglement and separability. This is presented in the context of classi...
Simon Perdrix