Sciweavers

6434 search results - page 1045 / 1287
» Model Transformations with Reference Models
Sort
View
HASE
1998
IEEE
15 years 8 months ago
Verification in Concurrent Programming with Petri Nets Structural Techniques
This paper deals with verification of flow control in concurrent programs. We use Ada language model as reference. After translation of Ada programs into Petri nets (named Ada net...
Kamel Barkaoui, Jean-François Pradat-Peyre
116
Voted
IRREGULAR
1997
Springer
15 years 7 months ago
Programming with Shared Data Abstractions
ing with shared data abstractions Simon Dobson1 and Don Goodeve2 1 Well-Founded Systems Unit, CLRC Rutherford Appleton Laboratory, UK 2 School of Computer Studies, University of Le...
Simon A. Dobson, Don Goodeve
122
Voted
ESORICS
1994
Springer
15 years 7 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
129
Voted
AOSD
2007
ACM
15 years 7 months ago
Fully abstract semantics of additive aspects by translation
stract Semantics of Additive Aspects by Translation S. B. Sanjabi C.-H. L. Ong Oxford University Computing Laboratory We study the denotational semantics of an aspect calculus by ...
S. B. Sanjabi, C.-H. Luke Ong
115
Voted
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 7 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
« Prev « First page 1045 / 1287 Last » Next »