Sciweavers

974 search results - page 154 / 195
» Formal Modeling of Communication Traces
Sort
View
ASM
2003
ASM
15 years 4 months ago
An ASM Semantics of UML Derived from the Meta-model and Incorporating Actions
We present an approach towards a formal dynamic semantics for UML using ASM. We aim to remain as close as possible to the standard definition of UML and to cover the operational pa...
Ileana Ober
85
Voted
ESORICS
1994
Springer
15 years 3 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 3 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 1 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
POPL
2008
ACM
15 years 11 months ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume