Sciweavers

2875 search results - page 432 / 575
» Model checking agentspeak
Sort
View
98
Voted
VSTTE
2005
Springer
15 years 6 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
97
Voted
AIMSA
2004
Springer
15 years 6 months ago
Planning and Monitoring Web Service Composition
The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, a...
Marco Pistore, Fabio Barbon, Piergiorgio Bertoli, ...
99
Voted
DRM
2004
Springer
15 years 6 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
111
Voted
FASE
2004
Springer
15 years 6 months ago
Predictable Dynamic Plugin Systems
Abstract. To be able to build systems by composing a variety of components dynamically, adding and removing as required, is desirable. Unfortunately systems with evolving architect...
Robert Chatley, Susan Eisenbach, Jeff Kramer, Jeff...
102
Voted
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
15 years 6 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...