Sciweavers

934 search results - page 126 / 187
» Elementary Sets of Logic Programs
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
MIDDLEWARE
2007
Springer
15 years 4 months ago
Self-adaptation of event-driven component-oriented middleware using aspects of assembly
Pervasive devices are becoming popular and smaller. Those mobile systems should be able to adapt to changing requirements and execution environments. But it requires the ability t...
Daniel Cheung-Foo-Wo, Jean-Yves Tigli, Stephane La...
BMCBI
2007
109views more  BMCBI 2007»
14 years 10 months ago
TABASCO: A single molecule, base-pair resolved gene expression simulator
Background: Experimental studies of gene expression have identified some of the individual molecular components and elementary reactions that comprise and control cellular behavio...
Sriram Kosuri, Jason R. Kelly, Drew Endy
122
Voted
HLPPP
1991
15 years 1 months ago
Reasoning About Synchronic Groups
Swarm is a computational model which extends the UNITY model in three important ways: (1) UNITY’s fixed set of variables is replaced by an unbounded set of tuples which are add...
Gruia-Catalin Roman, H. Conrad Cunningham
FM
2003
Springer
108views Formal Methods» more  FM 2003»
15 years 3 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002