Sciweavers

6960 search results - page 407 / 1392
» Continuity Analysis of Programs
Sort
View
DBPL
2007
Springer
100views Database» more  DBPL 2007»
15 years 11 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar
ESOP
2004
Springer
15 years 10 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICALP
2001
Springer
15 years 9 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
131
Voted
IRAL
2000
ACM
15 years 9 months ago
Structural analysis of cooking preparation steps in Japanese
We propose a method to create process flow graphs automatically from textbooks for cooking programs. This is realized by understanding context by narrowing down the domain to cook...
Reiko Hamada, Ichiro Ide, Shuichi Sakai, Hidehiko ...
144
Voted
IFIP
1999
Springer
15 years 9 months ago
The Tyranny of Space in Organizational Analysis
We want to understand organizational process as the temporal making of meanings, but our vocabulary for doing so is predominantly spatial. Some mistakes this has led to in my own ...
Richard J. Boland Jr.