Sciweavers

2137 search results - page 266 / 428
» Proving Abstract Non-interference
Sort
View
147
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 9 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
COOPIS
2003
IEEE
15 years 9 months ago
Re-factoring Middleware Systems: A Case Study
Abstract. Aspect oriented programming brings us new design perspectives since it permits the superimpositions of multiple abstraction models on top of one another. It is a very pow...
Charles Zhang, Hans-Arno Jacobsen
ECOOP
2003
Springer
15 years 9 months ago
A Calculus of Untyped Aspect-Oriented Programs
Abstract. Aspects have emerged as a powerful tool in the design and development of systems, allowing for the encapsulation of program transformations. The dynamic semantics of aspe...
Radha Jagadeesan, Alan Jeffrey, James Riely
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 8 months ago
Resource sharing optimality in WiFi infrastructure networks
Abstract— In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this...
Laura Giarré, Giovanni Neglia, Ilenia Tinni...
WIA
2001
Springer
15 years 8 months ago
Past Pushdown Timed Automata
d Abstract) Zhe Dang   , Tevfik Bultan ¡ , Oscar H. Ibarra ¡ , and Richard A. Kemmerer ¡ ¢ School of Electrical Engineering and Computer Science Washington State University P...
Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard ...