Sciweavers

329 search results - page 47 / 66
» Automatic Proofs for Scalecharts
Sort
View
TOCS
2002
70views more  TOCS 2002»
13 years 9 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
SAC
2008
ACM
13 years 9 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...
TCS
2010
13 years 8 months ago
Contract-based discovery of Web services modulo simple orchestrators
Web services are distributed processes with a public description of their behavior, or contract. The availability of repositories of Web service descriptions enables interesting f...
Luca Padovani
APSEC
2009
IEEE
13 years 7 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
TNN
2010
233views Management» more  TNN 2010»
13 years 4 months ago
A hierarchical RBF online learning algorithm for real-time 3-D scanner
In this paper, a novel real-time online network model is presented. It is derived from the hierarchical radial basis function (HRBF) model and it grows by automatically adding unit...
Stefano Ferrari, Francesco Bellocchio, Vincenzo Pi...