Sciweavers

15778 search results - page 3045 / 3156
» Aikido and software engineering
Sort
View
FOSSACS
2003
Springer
15 years 3 months ago
When Ambients Cannot Be Opened
rized Verification by Probabilistic Abstraction . . . . . . . . . . . . . . . . 87 Tamarah Arons, Amir Pnueli, Lenore Zuck Genericity and the π-Calculus . . . . . . . . . . . . ....
Iovka Boneva, Jean-Marc Talbot
FOSSACS
2003
Springer
15 years 3 months ago
A Monadic Multi-stage Metalanguage
We describe a metalanguage MMML, which makes explicit the order of evaluation (in the spirit of monadic metalanguages) and the staging of computations (as in languages for multi-l...
Eugenio Moggi, Sonia Fagorzi
FSTTCS
2003
Springer
15 years 3 months ago
Reachability Analysis of Process Rewrite Systems
We define a new model called O-PRS that extends the Process Rewrite Systems formalism with a new associative operator, “ ”, that allows to model parallel composition while ke...
Ahmed Bouajjani, Tayssir Touili
FSTTCS
2003
Springer
15 years 3 months ago
An Equational Theory for Transactions
Abstract. Transactions are commonly described as being ACID: Allor-nothing, Consistent, Isolated and Durable. However, although these words convey a powerful intuition, the ACID pr...
Andrew P. Black, Vincent Cremet, Rachid Guerraoui,...
FSTTCS
2003
Springer
15 years 3 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
« Prev « First page 3045 / 3156 Last » Next »