Sciweavers

1432 search results - page 155 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ENTCS
2008
64views more  ENTCS 2008»
15 years 3 months ago
Service Discovery and Negotiation With COWS
To provide formal foundations to current (web) services technologies, we put forward using COWS, a process calculus for specifying, combining and analysing services, as a uniform ...
Alessandro Lapadula, Rosario Pugliese, Francesco T...
CODES
2007
IEEE
15 years 7 months ago
Synchronization after design refinements with sensitive delay elements
The synchronous computational model with its simple computation and communication mechanism makes it easy to describe, simulate and formally verify synchronous embedded systems at...
Tarvo Raudvere, Ingo Sander, Axel Jantsch
QEST
2008
IEEE
15 years 10 months ago
A Parallel and Distributed Analysis Pipeline for Performance Tree Evaluation
Performance Trees are a unifying framework for the specification of performance queries involving measures and requirements. This paper describes an evaluation environment for Pe...
Darren K. Brien, Nicholas J. Dingle, William J. Kn...
EUROSYS
2007
ACM
15 years 7 months ago
Dynamic updates: another middleware service?
Middleware simplifies the construction of distributed applications. These applications typically require continuous uptime. The maintenance of distributed applications, though, im...
Susanne Cech Previtali