Sciweavers

20175 search results - page 130 / 4035
» Is abstraction the key to computing
Sort
View
78
Voted
ASM
2003
ASM
15 years 6 months ago
Abstract State Processes
Tommaso Bolognesi, Egon Börger
94
Voted
FAC
2010
93views more  FAC 2010»
14 years 10 months ago
Verification and falsification of programs with loops using predicate abstraction
Daniel Kroening, Georg Weissenbacher
CONEXT
2005
ACM
15 years 2 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati