Sciweavers

4370 search results - page 721 / 874
» Algebra of Logic Programming
Sort
View
133
Voted
KBSE
2005
IEEE
15 years 9 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
142
Voted
DCOSS
2005
Springer
15 years 9 months ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
145
Voted
PPDP
2005
Springer
15 years 9 months ago
Self-tuning resource aware specialisation for prolog
The paper develops a self-tuning resource aware partial evaluation technique for Prolog programs, which derives its own control strategies tuned for the underlying computer archit...
Stephen-John Craig, Michael Leuschel
118
Voted
PPDP
2005
Springer
15 years 9 months ago
Automatic type inference via partial evaluation
Type checking and type inference are fundamentally similar problems. However, the algorithms for performing the two operations, on the same type system, often differ significant...
Aaron Tomb, Cormac Flanagan
116
Voted
CCS
2004
ACM
15 years 9 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei