Sciweavers

2613 search results - page 453 / 523
» Active Software Artifacts
Sort
View
CAEPIA
2003
Springer
15 years 5 months ago
A Document-Oriented Approach to the Development of Knowledge Based Systems
ADDS (Approach to Document-based Development of Software) is an approach to the development of applications based on a document-oriented paradigm. According to this paradigm, appli...
José Luis Sierra, Baltasar Fernández...
FSTTCS
2003
Springer
15 years 5 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
ICES
2003
Springer
103views Hardware» more  ICES 2003»
15 years 5 months ago
Fault Tolerance via Endocrinologic Based Communication for Multiprocessor Systems
The communication mechanism used by the biological cells of higher animals is an integral part of an organisms ability to tolerate cell deficiency or loss. The massive redundancy ...
Andrew J. Greensted, Andrew M. Tyrrell
ESOP
2010
Springer
15 years 5 months ago
On the Expressive Power of Primitives for Compensation Handling
Modern software systems have frequently to face unexpected events, reacting so to reach a consistent state. In the field of concurrent and mobile systems (e.g., for web services) ...
Ivan Lanese, Cátia Vaz, Carla Ferreira
DSN
2002
IEEE
15 years 4 months ago
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...