Sciweavers

1269 search results - page 152 / 254
» Pi-Calculus in Logical Form
Sort
View
ACSC
2006
IEEE
15 years 11 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
CSFW
2005
IEEE
15 years 11 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
15 years 11 months ago
Real-Time and Distributed AV Content Analysis System for Consumer Electronics Networks
The ever-increasing complexity of generic MultimediaContent-Analysis-based (MCA) solutions, their processing power demanding nature and the need to prototype and assess solutions ...
Jan Nesvadba, Pedro Fonseca, Alexander Sinitsyn, F...
DFG
2004
Springer
15 years 11 months ago
A Unifying Semantics for Sequential Function Charts
Programmable Logic Controllers (PLC) are widely used as device controllers for assembly lines, chemical processes, or power plants. Sequential Function Charts (SFC) form one of the...
Nanette Bauer, Ralf Huuck, Ben Lukoschus, Sebastia...
ESOP
2004
Springer
15 years 10 months ago
Canonical Graph Shapes
Abstract. Graphs are an intuitive model for states of a (software) system that include pointer structures — for instance, object-oriented programs. However, a naive encoding resu...
Arend Rensink