Sciweavers

1432 search results - page 136 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
116
Voted
MODELS
2007
Springer
15 years 9 months ago
Using Domain-Specific Modeling to Generate User Interfaces for Wizards
The rising adoption and incorporation of computers into everyday life requires human-computer interaction methods to be efficient and easy to understand. Simultaneously, complexit...
Enis Afgan, Jeffrey G. Gray, Purushotham Bangalore
133
Voted
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 4 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
149
Voted
ISORC
2005
IEEE
15 years 9 months ago
Object-Reuse for More Predictable Real-Time Java Behavior
One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-...
Jameela Al-Jaroodi, Nader Mohamed
118
Voted
ICFP
2007
ACM
16 years 3 months ago
McErlang: a model checker for a distributed functional programming language
We present a model checker for verifying distributed programs written in the Erlang programming language. Providing a model checker for Erlang is especially rewarding since the la...
Hans Svensson, Lars-Åke Fredlund
106
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Self management of a mobile thin client service
Mobile thin client computing is an enabler for the execution of demanding applications from mobile handhelds. In thin client computing, the application is executed on remote serve...
Lien Deboosere, Bert Vankeirsbilck, Pieter Simoens...