Sciweavers

289 search results - page 19 / 58
» A Direct Construction of a Universal Extended H System
Sort
View
FM
2009
Springer
189views Formal Methods» more  FM 2009»
13 years 5 months ago
Model-Based GUI Testing Using Uppaal at Novo Nordisk
Abstract. This paper details a collaboration between Aalborg University and NOVO Nordisk in developing an automatic model-based test generation tool for system testing of the graph...
Ulrik H. Hjort, Jacob Illum Rasmussen, Kim Guldstr...
CHI
2009
ACM
14 years 8 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ESOP
2006
Springer
13 years 11 months ago
Step-Indexed Syntactic Logical Relations for Recursive and Quantified Types
We present a sound and complete proof technique, based on syntactic logical relations, for showing contextual equivalence of expressions in a -calculus with recursive types and imp...
Amal J. Ahmed
IWCMC
2009
ACM
14 years 1 months ago
Performance analysis and adaptive power control for block coded collaborative networks
We derive theoretical bit and frame error rate expressions for decode-and-forward (DF) collaborative networks containing M users, employing a variety of block codes over a Rayleig...
W. Guo, Ioannis Chatzigeorgiou, Ian J. Wassell, Ro...