Sciweavers

10159 search results - page 357 / 2032
» System Design Validation Using Formal Models
Sort
View
ISCI
2008
86views more  ISCI 2008»
15 years 4 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
APSEC
2000
IEEE
15 years 8 months ago
Enterprise modeling using class and instance models
Current object-oriented formalisms, such as UML, focus on describing class models and use instance models only for depicting scenarios. Little attention is being devoted to defini...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano
SIGMOBILE
2002
80views more  SIGMOBILE 2002»
15 years 3 months ago
The design and applications of a context service
ese two applications are built upon the abstraction provided by the Context Service and thus help validate the design of this service. The first application, a Notification Dispatc...
Hui Lei, Daby M. Sow, John S. Davis II, Guruduth B...
SPLC
2008
15 years 5 months ago
Calculating and Modeling Common Parts of Software Product Lines
This paper builds on product line CCS (PL-CCS), an algebraic approach to modeling the behavior of software product lines. The semantics of PL-CCS specifications is given in terms ...
Alexander Gruler, Martin Leucker, Kathrin D. Schei...
FM
1997
Springer
126views Formal Methods» more  FM 1997»
15 years 8 months ago
Reconciling Real-Time with Asynchronous Message Passing
At rst sight, real-time and asynchronous message passing like in SDL and ROOM seem to be incompatible. Indeed these languages fail to model real-time constraints accurately. In thi...
Manfred Broy, Radu Grosu, Cornel Klein