Sciweavers

4693 search results - page 815 / 939
» Verifying Hybrid Systems
Sort
View
CSMR
1998
IEEE
15 years 5 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
116
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 5 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
ICCS
1998
Springer
15 years 5 months ago
Handling Specification Knowledge Evolution Using Context Lattices
Internet-based information technologies have considerable potential for improving collaboration in professional communities. In this paper, we explain the concept of user-driven sp...
Aldo de Moor, Guy W. Mineau
120
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 5 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
UML
1998
Springer
15 years 5 months ago
The UML as a Formal Modeling Notation
The Uni ed Modeling Language UML is rapidly emerging as a de-facto standard for modelling OO systems. Given this role, it is imperative that the UML needs a well-de ned, fully expl...
Andy Evans, Robert B. France, Kevin Lano, Bernhard...