Sciweavers

210 search results - page 9 / 42
» A Formal Theory of Key Conjuring
Sort
View
JUCS
2006
104views more  JUCS 2006»
13 years 7 months ago
Constructive Failure in Functional-Logic Programming: From Theory to Implementation
: Functional-logic programming amalgamates some of the main features of both functional and logic styles into a single paradigm. Nevertheless, negation is a widely investigated fea...
Jaime Sánchez-Hernández
IWCMC
2006
ACM
14 years 1 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
SEMWEB
2009
Springer
14 years 1 months ago
Measuring the Structural Preservation of Semantic Hierarchy Alignment
We present a method to measure the amount of structural distortion carried by an alignment between two taxonomic cores of ontologies represented as semantic hierarchies. We present...
Cliff Joslyn, Patrick Paulson, Amanda White
ESORICS
2002
Springer
14 years 7 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
NJC
2006
86views more  NJC 2006»
13 years 7 months ago
Structured Formal Development in Isabelle
Abstract. General purpose theorem provers provide advanced facilities for proving properties about specifications, and may therefore be a valuable tool in formal program developmen...
Maksym Bortin, Einar Broch Johnsen, Christoph L&uu...