Sciweavers

793 search results - page 134 / 159
» Argumentation and standards of proof
Sort
View
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 4 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
COMPSAC
2002
IEEE
14 years 3 months ago
A Toolset for Supporting UML Static and Dynamic Model Checking
The Unified Modeling Language has become widely accepted as a standard in software development. Several tools have been produced to support UML model validation. However, most of...
Wuwei Shen, Kevin J. Compton, James Huggins
CISIS
2009
IEEE
14 years 3 months ago
Smews: Smart and Mobile Embedded Web Server
—In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use ...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
ASPLOS
2000
ACM
14 years 3 months ago
FLASH vs. (Simulated) FLASH: Closing the Simulation Loop
Simulation is the primary method for evaluating computer systems during all phases of the design process. One significant problem with simulation is that it rarely models the syst...
Jeff Gibson, Robert Kunz, David Ofelt, Mark Heinri...
ICFP
2000
ACM
14 years 3 months ago
Syntactic accidents in program analysis: on the impact of the CPS transformation
We show that a non-duplicating transformation into Continuation-Passing Style (CPS) has no effect on control-flow analysis, a positive effect on binding-time analysis for tradi...
Daniel Damian, Olivier Danvy