Sciweavers

2702 search results - page 258 / 541
» Practically Applicable Formal Methods
Sort
View
116
Voted
INFOCOM
2010
IEEE
15 years 28 days ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
152
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 6 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
UML
2005
Springer
15 years 8 months ago
Using Process Algebra to Validate Behavioral Aspects of Object-Oriented Models
We present in this paper a rigorous and automated based approach for the behavioral validation of control software systems. This approach relies on metamodeling, model-transformati...
Alban Rasse, Jean-Marc Perronne, Pierre-Alain Mull...
SFM
2005
Springer
243views Formal Methods» more  SFM 2005»
15 years 8 months ago
Hermes: Agent-Based Middleware for Mobile Computing
Hermes is a middleware system for design and execution of activity-based applications in distributed environments. It supports mobile computation as an application implementation s...
Flavio Corradini, Emanuela Merelli
DOCENG
2009
ACM
15 years 9 months ago
Differential synchronization
This paper describes the Differential Synchronization (DS) method for keeping documents synchronized. The key feature of DS is that it is simple and well suited for use in both no...
Neil Fraser