Sciweavers

3555 search results - page 511 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TSE
2010
125views more  TSE 2010»
15 years 2 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
IACR
2011
135views more  IACR 2011»
14 years 4 months ago
Charm: A framework for Rapidly Prototyping Cryptosystems
We describe Charm, an extensible framework designed for rapid prototyping of cryptographic systems that utilize the latest advances in cryptography, such as identity and attribute...
Joseph A. Akinyele, Matthew Green, Aviel D. Rubin
CADE
2007
Springer
16 years 4 months ago
Bidirectional Decision Procedures for the Intuitionistic Propositional Modal Logic IS4
We present a multi-context focused sequent calculus whose derivations are in bijective correspondence with normal natural deductions in the propositional fragment of the intuitioni...
Samuli Heilala, Brigitte Pientka
IWANN
2009
Springer
15 years 11 months ago
Outdoors Monitoring of Elderly People Assisted by Compass, GPS and Mobile Social Network
Abstract. We explore the use of mobile social network technology combined with modern mobile phone hardware as a platform for programming applications in the elder care area. An ap...
Roberto Calvo-Palomino, Pedro de las Heras Quir&oa...
DOLAP
2009
ACM
15 years 11 months ago
LMDQL: link-based and multidimensional query language
The current commercial and academic OLAP tools do not process XML data that make use of XLink. To develop OLAP systems for helping in the analysis of such data, this paper propose...
Paulo Caetano da Silva, Fábio Santos Souza,...