Sciweavers

5407 search results - page 1014 / 1082
» The Software Engineering Global Model
Sort
View
AC
1998
Springer
15 years 2 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
APSEC
2004
IEEE
15 years 1 months ago
JAOUT: Automated Generation of Aspect-Oriented Unit Test
Unit testing is a methodology for testing small parts of an application independently of whatever application uses them. It is time consuming and tedious to write unit tests, and ...
Guoqing Xu, Zongyuan Yang, Haitao Huang, Qian Chen...
ICSE
2000
IEEE-ACM
15 years 1 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
CODES
2009
IEEE
15 years 1 months ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross
AMAST
2008
Springer
14 years 11 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
« Prev « First page 1014 / 1082 Last » Next »