Sciweavers

3573 search results - page 504 / 715
» Reasoning about Codata
Sort
View
149
Voted
SIGSOFT
1994
ACM
15 years 9 months ago
Data Flow Analysis for Verifying Properties of Concurrent Programs
In this paper we present an approach, based on data ow analysis, that can provide cost-e ective analysis of concurrent programs with respect to explicitly stated correctness prope...
Matthew B. Dwyer, Lori A. Clarke
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 9 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
AINA
2007
IEEE
15 years 9 months ago
Domain Modelling for Ubiquitous Computing Applications
Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability. Such systems rely ...
Anthony Harrington, Vinny Cahill
AINA
2007
IEEE
15 years 9 months ago
Using Argumentative Agents to Manage Communities of Web Services
This paper presents a framework for specifying Web services communities. A Web service is an accessible application that humans, software agents, and other applications in general ...
Jamal Bentahar, Zakaria Maamar, Djamal Benslimane,...
137
Voted
BIRTHDAY
2009
Springer
15 years 9 months ago
Modular Verification of Strongly Invasive Aspects
An extended specification for aspects, and a new verification method based on model checking are used to establish the correctness of strongly-invasive aspects, independently of a...
Emilia Katz, Shmuel Katz