Sciweavers

963 search results - page 154 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
168
Voted
CSFW
2012
IEEE
13 years 6 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
MPC
2010
Springer
181views Mathematics» more  MPC 2010»
15 years 8 months ago
Process Algebras for Collective Dynamics
d Abstract) Jane Hillston Laboratory for Foundations of Computer Science, The University of Edinburgh, Scotland Quantitative Analysis Stochastic process algebras extend classical p...
Jane Hillston
122
Voted
CSCW
1996
ACM
15 years 7 months ago
Freeflow: Mediating Between Representation and Action in Workflow Systems
In order to understand some problems associated with workflow, we set out an analysis of workflow systems, identifying a number of basic issues in the underlying technology. This ...
Paul Dourish, Jim Holmes, Allan MacLean, Pernille ...
110
Voted
JSAT
2006
69views more  JSAT 2006»
15 years 3 months ago
The SAT 2005 Solver Competition on Random Instances
An analysis of the SAT 2005 sub-competition on random instances is given. This year this (sub-)competition set-up was geared to establish a basic setting, focusing on the instance...
Oliver Kullmann
138
Voted
SIAMAM
2011
14 years 6 months ago
Kinetics of Swelling Gels
We develop a general theory of the swelling kinetics of polymer gels, with the view that a polymer gel is a two-phase fluid. The model we propose is a free boundary problem and ca...
James P. Keener, Sarthok Sircar, Aaron L. Fogelson