Sciweavers

3573 search results - page 334 / 715
» Reasoning about Codata
Sort
View
RE
2007
Springer
15 years 11 months ago
Specifying Monitoring and Switching Problems in Context
Context-aware applications monitor changes in their operating environment and switch their behaviour to keep satisfying their requirements. Therefore, they must be equipped with th...
Mohammed Salifu, Yijun Yu, Bashar Nuseibeh
RE
2007
Springer
15 years 11 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
SAS
2007
Springer
112views Formal Methods» more  SAS 2007»
15 years 11 months ago
Taming the Wrapping of Integer Arithmetic
Variables in programs are usually confined to a fixed number of bits and results that require more bits are truncated. Due to the use of 32-bit and 64-bit variables, inadvertent ...
Axel Simon, Andy King
167
Voted
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 11 months ago
Obfuscation for Cryptographic Purposes
Abstract. An obfuscation O of a function F should satisfy two requirements: firstly, using O it should be possible to evaluate F; secondly, O should not reveal anything about F th...
Dennis Hofheinz, John Malone-Lee, Martijn Stam
TGC
2007
Springer
15 years 11 months ago
Type-Safe Distributed Programming with ML5
Abstract We present ML5, a high level programming language for spatially distributed computing. The language, a variant of ML, allows an entire distributed application to be develo...
Tom Murphy VII, Karl Crary, Robert Harper