Sciweavers

200 search results - page 26 / 40
» A Core Calculus for Provenance
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
JFP
2008
125views more  JFP 2008»
13 years 7 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
JLP
2006
81views more  JLP 2006»
13 years 7 months ago
Development graphs - Proof management for structured specifications
Development graphs are a tool for dealing with structured specifications in a formal program development in order to ease the management of change and reusing proofs. In this work...
Till Mossakowski, Serge Autexier, Dieter Hutter
CACM
2002
69views more  CACM 2002»
13 years 7 months ago
Software engineering considered harmful
ion, reviews, rigorous procedures, regression testing, metrics, and so forth) have been helpful, but we are still dealing with an intrinsically unsatisfactory situation. Especially...
Dennis de Champeaux
MAGS
2010
106views more  MAGS 2010»
13 years 2 months ago
On the convergence of autonomous agent communities
Community is a common phenomenon in natural ecosystems, human societies as well as artificial multi-agent systems such as those in web and Internet based applications. In many sel...
Hong Zhu, Fang Wang, Shufeng Wang