Sciweavers

2500 search results - page 286 / 500
» Specifying Behavior in C
Sort
View
EDOC
2009
IEEE
15 years 7 months ago
A Goal-Oriented Requirements Modelling Language for Enterprise Architecture
Methods for enterprise architecture, such as TOGAF, acknowledge the importance of requirements engineering in the development of enterprise architectures. Modelling support is nee...
Dick A. C. Quartel, Wilco Engelsman, Henk Jonkers,...
BIRTHDAY
2008
Springer
15 years 6 months ago
Models of Computation: A Tribute to Ugo Montanari's Vision
e [43] is the first paper on final, observational semantics in abstract data types, and the main reference for one of the MoC contributed papers in this volume. It presented severa...
Roberto Bruni, Vladimiro Sassone
CCS
2008
ACM
15 years 6 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
CCS
2008
ACM
15 years 6 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
DIS
2008
Springer
15 years 5 months ago
Feature Selection in Taxonomies with Applications to Paleontology
Taxonomies for a set of features occur in many real-world domains. An example is provided by paleontology, where the task is to determine the age of a fossil site on the basis of t...
Gemma C. Garriga, Antti Ukkonen, Heikki Mannila