Sciweavers

709 search results - page 79 / 142
» An Equational Theory for Transactions
Sort
View
CCS
2005
ACM
15 years 4 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
VISUALIZATION
1992
IEEE
15 years 3 months ago
Virtual Spacetime: An Environment for the Visualization of Curved Spacetimes via Geodesic Flows
We describe an implementation of a virtual environment for visualizing the geometry of curved spacetime by the display of interactive geodesics. This technique displays the paths ...
Steve Bryson
ENTCS
2008
94views more  ENTCS 2008»
14 years 11 months ago
From Reversible to Irreversible Computations
In this paper we study the relation between reversible and irreversible computation applicable to different models of computation -- here we are considering classical and quantum ...
Alexander S. Green, Thorsten Altenkirch
MAM
2008
138views more  MAM 2008»
14 years 11 months ago
FPGA based tester tool for hybrid real-time systems
This paper presents a design methodology for a hybrid Hardwarein-the-Loop (HIL) tester tool, based on both discrete event system theory, given by timed automata, and continuous sy...
Jan Krakora, Zdenek Hanzálek
IJMTM
2007
80views more  IJMTM 2007»
14 years 11 months ago
Assessing the inherent flexibility of product families for meeting customisation requirements
: This paper presents a systematic approach based on the axiomatic design theory to assess the inherent flexibility of the product family to generate the product variants for custo...
Bin Dan, Mitchell M. Tseng