Sciweavers

1356 search results - page 237 / 272
» The ideal of verified software
Sort
View
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
FOSSACS
2008
Springer
15 years 1 months ago
Footprints in Local Reasoning
Local reasoning about programs exploits the natural local behaviour common in programs by focussing on the footprint - that part of the resource accessed by the program. We address...
Mohammad Raza, Philippa Gardner
BMCBI
2008
169views more  BMCBI 2008»
14 years 12 months ago
CompMoby: Comparative MobyDick for detection of cis-regulatory motifs
Background: The regulation of gene expression is complex and occurs at many levels, including transcriptional and post-transcriptional, in metazoans. Transcriptional regulation is...
Christina Chaivorapol, Collin Melton, Grace Wei, R...
JSS
2008
93views more  JSS 2008»
14 years 11 months ago
A language for high-level description of adaptive web systems
This paper focuses on the proposal, design, and implementation of AWL, the Adaptive Web Language. Also, an example application named PENS is explained and implemented in AWL. AWL ...
S. Hossein Sadat-Mohtasham, Ali A. Ghorbani
JSS
2010
120views more  JSS 2010»
14 years 10 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...