Sciweavers

1884 search results - page 275 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
14 years 1 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
ER
2010
Springer
154views Database» more  ER 2010»
15 years 6 days ago
Modelling Functional Requirements in Spatial Design
Abstract. We demonstrate the manner in which high-level design requirements, e.g., as they correspond to the commonsensical conceptualisation of expert designers, may be formally s...
Mehul Bhatt, Joana Hois, Oliver Kutz, Frank Dylla
TPHOL
2008
IEEE
15 years 8 months ago
The Isabelle Framework
g to the well-known “LCF approach” of secure inferences as abstract datatype constructors in ML [16]; explicit proof terms are also available [8]. Isabelle/Isar provides sophis...
Makarius Wenzel, Lawrence C. Paulson, Tobias Nipko...
CAISE
2003
Springer
15 years 6 months ago
Introducing Custom Language Extensions to SQL: 1999
Abstract. Even though SQL has become widely accepted as a language for implementing relational database schemas and querying data, there are cases where s experience the need for n...
Jernej Kovse, Wolfgang Mahnke
CADUI
2004
15 years 3 months ago
Dialogue-Based Design of Web Usability Questionnaires Using Ontologies
Abstract Questionnaires are nowadays widely used usability evaluation instruments, and several generic usability questionnaires are available. But these generic artifacts are not a...
Elena García Barriocanal, Miguel Áng...