Sciweavers

2282 search results - page 203 / 457
» Active property checking
Sort
View
ESOP
2008
Springer
15 years 6 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
WECWIS
2006
IEEE
151views ECommerce» more  WECWIS 2006»
15 years 11 months ago
DAG Synchronization Constraint Language for Business Processes
Correct synchronization among activities is critical in a business process. Current workflow languages such as BPEL specify the control flow of processes explicitly. However, thei...
Qinyi Wu, Akhil Sahai
ISWC
2000
IEEE
15 years 9 months ago
What Shall We Teach Our Pants?
If a wearable device can register what the wearer is currently doing, it can anticipate and adjust its behavior to avoid redundant interaction with the user. However, the relevanc...
Kristof Van Laerhoven, Ozan Cakmakci
CSCW
1996
ACM
15 years 9 months ago
Evolutionary Engagement in an Ongoing Collaborative Work Process: A Case Study
We describe a case study in which experimental collaboration technologies were used for over two years in the real, ongoing work process of intellectual property management (IPM) ...
Thomas P. Moran, Patrick Chiu, Steve R. Harrison, ...
148
Voted
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
15 years 8 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba