Sciweavers

1414 search results - page 235 / 283
» Combining Intruder Theories
Sort
View
ESOP
2004
Springer
15 years 3 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
ATAL
2003
Springer
15 years 3 months ago
A protocol for multi-agent diagnosis with spatially distributed knowledge
In a large distributed system it is often infeasible or even impossible to perform diagnosis using a single model of the whole system. Instead, several spatially distributed local...
Nico Roos, Annette ten Teije, Cees Witteveen
PLDI
2010
ACM
15 years 2 months ago
Mint: Java multi-stage programming using weak separability
Multi-stage programming (MSP) provides a disciplined approach to run-time code generation. In the purely functional setting, it has been shown how MSP can be used to reduce the ov...
Edwin Westbrook, Mathias Ricken, Jun Inoue, Yilong...
VISUALIZATION
1998
IEEE
15 years 2 months ago
Building perceptual textures to visualize multidimensional datasets
This paper presents a new method for using texture to visualize multidimensional data elements arranged on an underlying threedimensional height field. We hope to use simple textu...
Christopher G. Healey, James T. Enns