Sciweavers

144 search results - page 11 / 29
» How Expressions Can Code for Automata
Sort
View
ICSE
2010
IEEE-ACM
15 years 2 months ago
Linking e-mails and source code artifacts
E-mails concerning the development issues of a system constitute an important source of information about high-level design decisions, low-level implementation concerns, and the s...
Alberto Bacchelli, Michele Lanza, Romain Robbes
ECOOP
2007
Springer
15 years 6 months ago
Towards correct evolution of components using VPA-based aspects
Abstract. Interaction protocols are a popular means to construct correct component-based systems. Aspects that modify such protocols are interesting in this context because they su...
Dong Ha Nguyen, Mario Südholt
125
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 2 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief
ICSE
2008
IEEE-ACM
16 years 14 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
120
Voted
APLAS
2011
ACM
14 years 11 days ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld