Sciweavers

732 search results - page 81 / 147
» A Formal Model of Provenance in Distributed Systems
Sort
View
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
15 years 4 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
CONCUR
1998
Springer
15 years 2 months ago
Algebraic Techniques for Timed Systems
Performance evaluation is a central issue in the design of complex real-time systems. In this work, we propose an extension of socalled "Max-Plus" algebraic techniques to...
Albert Benveniste, Claude Jard, Stephane Gaubert
FMICS
2010
Springer
14 years 11 months ago
Model Checking the FlexRay Physical Layer Protocol
Abstract. The FlexRay standard, developed by a cooperation of leading companies in the automotive industry, is a robust communication protocol for distributed components in modern ...
Michael Gerke 0002, Rüdiger Ehlers, Bernd Fin...
EDOC
2006
IEEE
15 years 3 months ago
Structural Patterns for Soundness of Business Process Models
The correctness of business process models is of paramount importance for the application on an enterprise level. A severe problem is that several languages for business process m...
Boudewijn F. van Dongen, Jan Mendling, Wil M. P. v...
ASE
2008
102views more  ASE 2008»
14 years 10 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce