Sciweavers

5451 search results - page 867 / 1091
» Typed Operational Semantics
Sort
View
ECIS
2000
15 years 5 months ago
The Extensible Markup Language - New Opportunities in the Area of EDI
: Only about 5% of the companies which could profit from EDI actually use it. The main reason is that especially small and medium-sized enterprises (SMEs) try to avoid the consider...
Tim Weitzel, Frank Ladner, Peter Buxmann
NC
1998
143views Neural Networks» more  NC 1998»
15 years 5 months ago
Spotting Arabic Phonetic Features Using Modular Connectionist Architectures and a Rule-Based System
This paper reports the results of experiments in complex Arabic phonetic features identification using a rulebased system (SARPH) and modular connectionist architectures. The firs...
Sid-Ahmed Selouani, Jean Caelen
VVEIS
2007
15 years 5 months ago
UML-driven Information Systems and their Formal Integration Validation and Distribution
Being the de-facto standard (object-oriented-OO) method(-logy) for software-intensive systems development, UML with its different diagrams and supporting tools represent nowadays t...
Nasreddine Aoumeur, Gunter Saake
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 5 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
CSL
2010
Springer
15 years 5 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers