Sciweavers

3441 search results - page 541 / 689
» Provenance of Software Development Processes
Sort
View
FOSSACS
2004
Springer
15 years 8 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ARITH
2003
IEEE
15 years 8 months ago
Decimal Floating-Point: Algorism for Computers
Decimal arithmetic is the norm in human calculations, and human-centric applications must use a decimal floating-point arithmetic to achieve the same results. Initial benchmarks i...
Michael F. Cowlishaw
DSN
2003
IEEE
15 years 8 months ago
Reliable Communication in Overlay Networks
Abstract— Reliable point-to-point communication is usually achieved in overlay networks by applying TCP/IP on the end nodes of a connection. This paper presents an hopby-hop reli...
Yair Amir, Claudiu Danilov
FDL
2003
IEEE
15 years 8 months ago
UML-based Specifications of an Embedded System oriented to HW/SW partitioning: a case study
The Unified Modelling Language (UML) is a language for specifying, visualizing, constructing, and documenting the artefacts of software systems, as well as for modelling business ...
A. Minosi, S. Mankan, A. Martinola, F. Balzarini, ...
CAEPIA
2003
Springer
15 years 8 months ago
A Framework for Ontology Reuse and Persistence Integrating UML and Sesame
Nowadays there is a great effort underway to improve the World Wide Web. A better content organisation, allowing automatic processing, leading to the Semantic Web is one of the mai...
Carlos Pedrinaci, Amaia Bernaras, Tim Smithers, Je...