Sciweavers

449 search results - page 76 / 90
» Formal Modeling of Communication Protocols by Graph Transfor...
Sort
View
KBSE
2005
IEEE
15 years 5 months ago
Generation of visual editors as eclipse plug-ins
Visual Languages (VLs) play an important role in software system development. Especially when looking at well-defined domains, a broad variety of domain specific visual language...
Karsten Ehrig, Claudia Ermel, Stefan Hänsgen,...
MOBICOM
2006
ACM
15 years 5 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
FASE
2008
Springer
15 years 1 months ago
Regular Inference for State Machines Using Domains with Equality Tests
Abstract. Existing algorithms for regular inference (aka automata learning) allows to infer a finite state machine by observing the output that the machine produces in response to ...
Therese Berg, Bengt Jonsson, Harald Raffelt
SIMPRA
2008
131views more  SIMPRA 2008»
14 years 11 months ago
Distributed simulation of DEVS and Cell-DEVS models in CD++ using Web-Services
: DEVS is a Modeling and Simulation formalism that has been widely used to study the dynamics of discrete event systems. Cell-DEVS is a DEVS-based formalism that defines spatial mo...
Gabriel A. Wainer, Rami Madhoun, Khaldoon Al-Zoubi
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 7 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs