Sciweavers

3830 search results - page 479 / 766
» From Reference Model to Component Model
Sort
View
ENTCS
2010
99views more  ENTCS 2010»
15 years 4 months ago
Describing Secure Interfaces with Interface Automata
Interface automata are a model that allows for the representation of stateful interfaces. In this paper we introduce a variant of interface automata, which we call interface struc...
Matias Lee, Pedro R. D'Argenio
VC
2008
93views more  VC 2008»
15 years 3 months ago
Contact identification for assembly-disassembly simulation with a haptic device
: Assembly/disassembly (A/D) simulations using haptic devices are facing difficulties while simulating insertion/extraction such as cylinders from holes. In order to address this c...
Robert Iacob, Peter Mitrouchev, Jean-Claude L&eacu...
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
15 years 2 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
JLP
2011
106views more  JLP 2011»
14 years 6 months ago
Concurrent Kleene Algebra and its Foundations
A Concurrent Kleene Algebra offers two composition operators, related by a weak version of an exchange law: when applied in a trace model of program semantics, one of them stands...
Tony Hoare, Bernhard Möller, Georg Struth, Ia...
ESORICS
2012
Springer
13 years 6 months ago
Unique Group Signatures
We initiate the study of unique group signature such that signatures of the same message by the same user will always have a large common component (i.e., unique identifier). It ...
Matthew K. Franklin, Haibin Zhang