Sciweavers

1497 search results - page 203 / 300
» Extended static checking
Sort
View
101
Voted
IJFCS
2007
93views more  IJFCS 2007»
15 years 19 days ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
119
Voted
CSL
2004
Springer
15 years 17 days ago
Arc minimization in finite-state decoding graphs with cross-word acoustic context
Recent approaches to large vocabulary decoding with finite state graphs have focused on the use of state minimization algorithms to produce relatively compact graphs. This paper e...
François Yvon, Geoffrey Zweig, George Saon
CN
1998
97views more  CN 1998»
15 years 12 days ago
An Architectural Description of Intelligent Network Features and Their Interactions
A brief explanation is given of the language ANISE (Architectural Notions In Service Engineering) that can be used to describe generic services as well as telecommunications servi...
Kenneth J. Turner
IFM
2010
Springer
124views Formal Methods» more  IFM 2010»
14 years 11 months ago
Safe Commits for Transactional Featherweight Java
Abstract. Transactions are a high-level alternative for low-level concurrencycontrol mechanisms such as locks, semaphores, monitors. A recent proposal for integrating transactional...
Thi Mai Thuong Tran, Martin Steffen
116
Voted
JCS
2010
124views more  JCS 2010»
14 years 11 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...