Sciweavers

4340 search results - page 748 / 868
» Formal Methods and Cryptography
Sort
View
CCS
2001
ACM
15 years 9 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
ER
2001
Springer
163views Database» more  ER 2001»
15 years 9 months ago
Towards Ontologically Based Semantics for UML Constructs
Abstract. Conceptual models are formal descriptions of application domains that are used in early stages of system development to support requirements analysis. The Unified Modeli...
Joerg Evermann, Yair Wand
ICALP
2001
Springer
15 years 9 months ago
Hidden Pattern Statistics
Abstract. We consider the sequence comparison problem, also known as “hidden pattern” problem, where one searches for a given subsequence in a text (rather than a string unders...
Philippe Flajolet, Yves Guivarc'h, Wojciech Szpank...
ICSE
2001
IEEE-ACM
15 years 9 months ago
Supporting Program Comprehension Using Semantic and Structural Information
The paper focuses on investigating the combined use of semantic and structural information of programs to support the comprehension tasks involved in the maintenance and reenginee...
Jonathan I. Maletic, Andrian Marcus
MMMACNS
2001
Springer
15 years 9 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato