Sciweavers

528 search results - page 32 / 106
» Construction of concrete verification models from C
Sort
View
WSC
2000
14 years 11 months ago
3D visualization of simulated construction operations
Significant advances have been made in the field of construction process modeling. However, no convenient graphical support tools exist that can depict the modeled operations in 3...
Vineet R. Kamat, Julio C. Martínez
CCS
2008
ACM
15 years 14 days ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ECIS
2004
14 years 12 months ago
Electronic business models: five cases from five industries
The term business model has been used loosely several times for describing a company's strategies, revenue model, processes and overall business logic both by researchers and...
Aleksi Horsti, Jyrki Tolonen, Malin Brännback
89
Voted
APWEB
2008
Springer
15 years 14 days ago
The Layered World of Scientific Conferences
Recent models have introduced the notion of dimensions and hierarchies in social networks. These models motivate the mining of small world graphs under a new perspective. We exempl...
Michael Kuhn 0002, Roger Wattenhofer
182
Voted
POPL
2008
ACM
15 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk