Sciweavers

202 search results - page 28 / 41
» aim 1999
Sort
View
LICS
1999
IEEE
15 years 1 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
ERSHOV
1999
Springer
15 years 1 months ago
The Essence of Program Transformation by Partial Evaluation and Driving
Abstract. An abstract framework is developed to describe program transformation by specializing a given program to a restricted set of inputs. Particular cases include partial eval...
Neil D. Jones
MSS
1999
IEEE
110views Hardware» more  MSS 1999»
15 years 1 months ago
Eurostore - Initial Design and First Results
A European consortium formed by science and industrial partners have started the EuroStore project1 to develop and market a Hierarchical Storage Management System (HSM) together w...
Martin Gasthuber, Patrick Fuhrmann, Duncan Roweth
RIDE
1999
IEEE
15 years 1 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu
SRDS
1999
IEEE
15 years 1 months ago
CosNamingFT - A Fault-Tolerant CORBA Naming Service
This paper describes the design and implementation of a fault-tolerant CORBA naming service - CosNamingFT. Every CORBA object is accessed through its Interoperable Object Referenc...
Lau Cheuk Lung, Joni da Silva Fraga, Jean-Marie Fa...