Sciweavers

1432 search results - page 112 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
122
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 10 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ICPADS
2005
IEEE
15 years 9 months ago
Efficient Distributed QoS Routing Protocol for MPLS Networks
- This paper proposes a new distributed QoS routing protocol, called Efficient Distributed QoS Routing (EDQR), for MPLS networks. The path searching algorithm of EDQR considers an ...
Man-Ching Yuen, Weijia Jia, Chi-Chung Cheung
HICSS
1997
IEEE
109views Biometrics» more  HICSS 1997»
15 years 7 months ago
Model-Integrated Programming
Model-integrated computing offers unique benefits for building computer-based systems. The tight integration of physical and information processess typical in CBSs is naturally ad...
Hubertus Franke, Janos Sztipanovits, Gabor Karsai
162
Voted
EMSOFT
2008
Springer
15 years 5 months ago
Active property checking
Runtime property checking (as implemented in tools like Purify or Valgrind) checks whether a program execution satisfies a property. Active property checking extends runtime check...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
236
Voted
AVI
2000
15 years 4 months ago
Generating User Interface Code in a Model Based User Interface Development Environment
Declarative models play an important role in most software design activities, by allowing designs to be constructed that selectively abstract over complex implementation details. ...
Paulo Pinheiro da Silva, Tony Griffiths, Norman W....