Sciweavers

3420 search results - page 633 / 684
» A Language-Based Approach to Security
Sort
View
PVLDB
2010
129views more  PVLDB 2010»
13 years 7 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
SAS
2010
Springer
159views Formal Methods» more  SAS 2010»
13 years 7 months ago
Automatic Abstraction for Intervals Using Boolean Formulae
c Abstraction for Intervals Using Boolean Formulae J¨org Brauer1 and Andy King2 1 Embedded Software Laboratory, RWTH Aachen University, Germany 2 Portcullis Computer Security, Pin...
Jörg Brauer, Andy King
SYNTHESE
2010
89views more  SYNTHESE 2010»
13 years 7 months ago
Proclus on the order of philosophy of nature
In this paper I show that Proclus is an adherent of the Classical Model of Science as set out elsewhere in this issue (de Jong and Betti 2008), and that he adjusts certain conditio...
Marije Martijn
WIOPT
2010
IEEE
13 years 7 months ago
Optimal revocations in ephemeral networks: A game-theoretic framework
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...
GI
2010
Springer
13 years 6 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich