Sciweavers

4693 search results - page 831 / 939
» Verifying Hybrid Systems
Sort
View
GRID
2007
Springer
15 years 19 days ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
137
Voted
PERVASIVE
2008
Springer
15 years 19 days ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
110
Voted
AAECC
2005
Springer
128views Algorithms» more  AAECC 2005»
15 years 19 days ago
The size-change principle and dependency pairs for termination of term rewriting
Abstract In [24], a new size-change principle was proposed to verify termination of functional programs automatically. We extend this principle in order to prove termination and in...
René Thiemann, Jürgen Giesl
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 18 days ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 18 days ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...