Sciweavers

407 search results - page 56 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
LCTRTS
2010
Springer
13 years 6 months ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla
SIGSOFT
2007
ACM
14 years 9 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
AAAI
1998
13 years 10 months ago
Modeling Web Sources for Information Integration
The Web is based on a browsing paradigm that makes it di cult to retrieve and integrate data from multiple sites. Today, the only way to do this is to build specialized applicatio...
Craig A. Knoblock, Steven Minton, José Luis...
ISF
2002
107views more  ISF 2002»
13 years 8 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik
CCS
2008
ACM
13 years 10 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...