Sciweavers

10707 search results - page 269 / 2142
» Designing executable abstractions
Sort
View
ADAEUROPE
2007
Springer
15 years 10 months ago
Static Detection of Livelocks in Ada Multitasking Programs
Abstract. In this paper we present algorithms to statically detect livelocks in Ada multitasking programs. Although the algorithms’ worst-case execution time is exponential, they...
Johann Blieberger, Bernd Burgstaller, Robert Mitte...
FSEN
2007
Springer
15 years 10 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 10 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...
AIIA
2005
Springer
15 years 9 months ago
Human-Robot Interaction Through Mixed-Initiative Planning for Rescue and Search Rovers
Abstract. In this paper we present a mixed-initiative planning approach to humanrobot interaction in a rescue domain. We deploy a model-based executive monitoring system to coordin...
Alberto Finzi, Andrea Orlandini
EUROGP
2005
Springer
123views Optimization» more  EUROGP 2005»
15 years 9 months ago
An Algorithmic Chemistry for Genetic Programming
Abstract. Genetic Programming has been slow at realizing other programming paradigms than conventional, deterministic, sequential vonNeumann type algorithms. In this contribution w...
Christian Lasarczyk, Wolfgang Banzhaf