Sciweavers

10575 search results - page 1822 / 2115
» T2Script Programming Language
Sort
View
139
Voted
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
15 years 7 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
122
Voted
CSFW
2004
IEEE
15 years 7 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
ECBS
2004
IEEE
153views Hardware» more  ECBS 2004»
15 years 7 months ago
Architectural Description with Integrated Data Consistency Models
The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed...
Peter Tabeling
115
Voted
CP
2006
Springer
15 years 7 months ago
High-Level Nondeterministic Abstractions in
el Nondeterministic Abstractions in C++ Laurent Michel1 , Andrew See1 , and Pascal Van Hentenryck2 1 University of Connecticut, Storrs, CT 06269-2155 2 Brown University, Box 1910, ...
Laurent Michel, Andrew See, Pascal Van Hentenryck
CP
2006
Springer
15 years 7 months ago
Generating Propagators for Finite Set Constraints
Ideally, programming propagators as implementations of constraints should be an entirely declarative specification process for a large class of constraints: a high-level declarativ...
Guido Tack, Christian Schulte, Gert Smolka
« Prev « First page 1822 / 2115 Last » Next »