Sciweavers

1323 search results - page 55 / 265
» Extended Modeling Languages for Interaction Protocol Design
Sort
View
138
Voted
AOSE
2005
Springer
15 years 9 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
120
Voted
CHI
2007
ACM
16 years 3 months ago
Keystroke-level model for advanced mobile phone interaction
The design of applications using mobile devices needs a different quality assessment than those known for desktop applications. Of the many aspects that have to be taken into acco...
Paul Holleis, Friederike Otto, Heinrich Hussmann, ...
C++
1992
83views more  C++ 1992»
15 years 4 months ago
Adding Concurrency to a Programming Language
A programming language that lacks facilities for concurrent programming can gain those facilities in two ways: the language can be extended with additional constructs, which will ...
Peter A. Buhr, G. Ditchfeld
133
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 9 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
129
Voted
AFRICACRYPT
2009
Springer
15 years 10 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim