Sciweavers

3357 search results - page 563 / 672
» On the Use of Process Trails to Understand Software Developm...
Sort
View
FOSSACS
2004
Springer
15 years 3 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ARITH
2003
IEEE
15 years 3 months ago
Decimal Floating-Point: Algorism for Computers
Decimal arithmetic is the norm in human calculations, and human-centric applications must use a decimal floating-point arithmetic to achieve the same results. Initial benchmarks i...
Michael F. Cowlishaw
DSN
2003
IEEE
15 years 3 months ago
Reliable Communication in Overlay Networks
Abstract— Reliable point-to-point communication is usually achieved in overlay networks by applying TCP/IP on the end nodes of a connection. This paper presents an hopby-hop reli...
Yair Amir, Claudiu Danilov
CAEPIA
2003
Springer
15 years 3 months ago
A Framework for Ontology Reuse and Persistence Integrating UML and Sesame
Nowadays there is a great effort underway to improve the World Wide Web. A better content organisation, allowing automatic processing, leading to the Semantic Web is one of the mai...
Carlos Pedrinaci, Amaia Bernaras, Tim Smithers, Je...
EMSOFT
2003
Springer
15 years 3 months ago
Constraint-Based Design-Space Exploration and Model Synthesis
An important bottleneck in model-based design of embedded systems is the cost of constructing models. This cost can be significantly decreased by increasing the reuse of existing m...
Sandeep Neema, Janos Sztipanovits, Gabor Karsai, K...