Sciweavers

2075 search results - page 324 / 415
» aime 2007
Sort
View
ENTCS
2007
89views more  ENTCS 2007»
14 years 9 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
ENTCS
2007
70views more  ENTCS 2007»
14 years 9 months ago
Component Substitutability via Equivalencies of Component-Interaction Automata
We provide a new look at formal aspects of component substitutability (replacement of a component with a new one) and independent implementability (reuse of a component in any sys...
Ivana Cerná, Pavlína Vareková...
ENTCS
2007
114views more  ENTCS 2007»
14 years 9 months ago
Parametric Performance Contracts for Software Components with Concurrent Behaviour
Performance prediction methods for component-based software systems aim at supporting design decisions of software architects during early development stages. With the increased a...
Jens Happe, Heiko Koziolek, Ralf Reussner
ENTCS
2007
113views more  ENTCS 2007»
14 years 9 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
ENTCS
2007
171views more  ENTCS 2007»
14 years 9 months ago
A Certifying Code Generation Phase
Guaranteeing correctness of compilation is a vital precondition for correct software. Code generation can be one of the most error-prone tasks in a compiler. One way to achieve tr...
Jan Olaf Blech, Arnd Poetzsch-Heffter