Sciweavers

55 search results - page 8 / 11
» birthday 2008
Sort
View
BIRTHDAY
2008
Springer
14 years 12 months ago
Model Transformation Languages and Their Implementation by Bootstrapping Method
In this paper a sequence of model transformation languages L0, L1, L2 is defined. The first language L0 is very simple, and for this language it is easy to build an efficient compi...
Janis Barzdins, Audris Kalnins, Edgars Rencis, Ser...
BIRTHDAY
2008
Springer
14 years 12 months ago
History Dependent Automata for Service Compatibility
We use History Dependent Automata (HD-automata) as a syntax-indepentend formalism to check compatibility of services at binding time in Service-Oriented Computing. Informally speak...
Vincenzo Ciancia, Gian Luigi Ferrari, Marco Pistor...
BIRTHDAY
2008
Springer
14 years 12 months ago
Dynamically Evolvable Dependable Software: From Oxymoron to Reality
We analyze the main motivations that lead to the present need for supporting continuous software evolution, and discuss some of the reasons for change requirements. Achieving softw...
Carlo Ghezzi, Paola Inverardi, Carlo Montangero
BIRTHDAY
2008
Springer
14 years 12 months ago
A Category of Explicit Fusions
Name passing calculi are nowadays an established field on its own. Besides their practical relevance, they offered an intriguing challenge, since the standard operational, denotati...
Filippo Bonchi, Maria Grazia Buscemi, Vincenzo Cia...
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 4 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...