Sciweavers

5525 search results - page 862 / 1105
» Verification of Model Transformations
Sort
View
ISW
2005
Springer
15 years 10 months ago
An Oblivious Transfer Protocol with Log-Squared Communication
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol for -bit strings with low-degree polylogarithmic receivercomputation, linear send...
Helger Lipmaa
LPAR
2005
Springer
15 years 10 months ago
Termination of Fair Computations in Term Rewriting
Abstract. The main goal of this paper is to apply rewriting termination technology —enjoying a quite mature set of termination results and tools— to the problem of proving auto...
Salvador Lucas, José Meseguer
SERA
2005
Springer
15 years 10 months ago
Bridging the Gap between Analysis and Design Using Dependency Diagrams
Requirements specifications often make use of a number of scenarios that are interrelated and that depend on each other in many ways. However, they are often treated separately, o...
Simona Vasilache, Jiro Tanaka
UML
2005
Springer
15 years 10 months ago
Refactoring OCL Annotated UML Class Diagrams
Refactoring of UML class diagrams is an emerging research topic and heavily inspired by refactoring of program code written in object-oriented implementation languages. Current cla...
Slavisa Markovic, Thomas Baar
VMCAI
2005
Springer
15 years 10 months ago
Information Flow Analysis for Java Bytecode
Abstract. We present a context-sensitive compositional analysis of information flow for full (mono-threaded) Java bytecode. Our idea consists in transforming the Java bytecode int...
Samir Genaim, Fausto Spoto