Sciweavers

2777 search results - page 211 / 556
» Example centric programming
Sort
View
95
Voted
IFIP
2004
Springer
15 years 6 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
107
Voted
ICCD
1992
IEEE
82views Hardware» more  ICCD 1992»
15 years 5 months ago
A Comparison of Self-Timed Design Using FPGA, CMOS, and GaAs Technologies
Asynchronous or self-timed systems that do not rely on a global clock to keep system components synchronized can offer significant advantages over traditional clocked circuits in ...
Erik Brunvand, Nick Michell, Kent F. Smith
98
Voted
AINA
2007
IEEE
15 years 5 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
102
Voted
CC
2004
Springer
114views System Software» more  CC 2004»
15 years 4 months ago
Integrating the Soot Compiler Infrastructure into an IDE
This paper presents the integration of Soot, a byte-code analysis and transformation framework, with an integrated development environment (IDE), Eclipse. Such an integrated toolki...
Jennifer Lhoták, Ondrej Lhoták, Laur...
125
Voted
ATAL
2008
Springer
15 years 3 months ago
Towards verifying compliance in agent-based web service compositions
We explore the problem of specification and verification of compliance in agent based Web service compositions. We use the formalism of temporal-epistemic logic suitably extended ...
Alessio Lomuscio, Hongyang Qu, Monika Solanki