Sciweavers

162 search results - page 24 / 33
» A Rule System for Network-Centric Operation in Massively Dis...
Sort
View
WOLLIC
2010
Springer
14 years 17 days ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...
ICSE
2010
IEEE-ACM
14 years 9 days ago
Runtime repair of software faults using event-driven monitoring
In software with emergent properties, despite the best efforts to remove faults before execution, there is a high likelihood that faults will occur during runtime. These faults c...
Chris Lewis 0002, Jim Whitehead
ICSE
2001
IEEE-ACM
13 years 12 months ago
Workshop on Software Engineering and Mobility
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Gruia-Catalin Roman, Gian Pietro Picco
DEBS
2003
ACM
14 years 23 days ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
WADT
1998
Springer
13 years 11 months ago
An Algebra of Graph Derivations Using Finite (co-) Limit Double Theories
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
Andrea Corradini, Martin Große-Rhode, Reiko ...