Sciweavers

84 search results - page 14 / 17
» Axiomatic and Behavioural Trust
Sort
View
MOBISEC
2009
Springer
14 years 2 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
IPPS
2006
IEEE
14 years 1 months ago
Neighbourhood maps: decentralised ranking in small-world P2P networks
Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In large-scale real world ...
Matteo Dell'Amico
ICFP
2008
ACM
14 years 7 months ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...
SCALESPACE
2001
Springer
14 years 2 days ago
Scale-Time Kernels and Models
Receptive field sensitivity profiles of visual front-end cells in the LGN and V1 area in intact animals can be measured with increasing accuracy, both in the spatial and temporal...
Bart M. ter Haar Romeny, Luc Florack, Mads Nielsen
MFCS
1991
Springer
13 years 11 months ago
CCS Dynamic Bisimulation is Progressing
Weak Observational Congruence (woc) defined on CCS agents is not a bisimulation since it does not require two states reached by bisimilar computations of woc agents to be still w...
Ugo Montanari, Vladimiro Sassone