Sciweavers

1894 search results - page 150 / 379
» A TLA Proof System
Sort
View
ASWEC
2007
IEEE
15 years 10 months ago
Timed Behavior Trees and Their Application to Verifying Real-Time Systems
Behavior Trees (BTs) are a graphical notation used for formalising functional requirements and have been successfully applied to several case studies. However, the notation curren...
Lars Grunske, Kirsten Winter, Robert Colvin
ACISP
2007
Springer
15 years 10 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
AIME
2007
Springer
15 years 10 months ago
Semantic Web Framework for Knowledge-Centric Clinical Decision Support Systems
Lately, there have been considerable efforts to computerize Clinical Practice Guidelines (CPG) so that they can be executed via Clinical Decision Support Systems (CDSS) at the poin...
Sajjad Hussain, Samina Raza Abidi, Syed Sibte Raza...
133
Voted
ACISP
2005
Springer
15 years 9 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
114
Voted
ISSAC
2005
Springer
125views Mathematics» more  ISSAC 2005»
15 years 9 months ago
Generalized normal forms and polynomial system solving
This paper describes a new method for computing the normal form of a polynomial modulo a zero-dimensional ideal I. We give a detailed description of the algorithm, a proof of its ...
Bernard Mourrain