Sciweavers

2573 search results - page 440 / 515
» Combinations of Modal Logics
Sort
View
FOSSACS
2009
Springer
15 years 11 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
15 years 11 months ago
Limiting the number of dirty cache lines
Abstract—Caches often employ write-back instead of writethrough, since write-back avoids unnecessary transfers for multiple writes to the same block. For several reasons, however...
Pepijn J. de Langen, Ben H. H. Juurlink
SEFM
2009
IEEE
15 years 11 months ago
Specifying Interacting Components with Coordinated Concurrent Scenarios
Abstract. We introduce a visual notation for local specification of concurrent components based on message sequence charts (MSCs). Each component is a finite-state machine whose ...
Prakash Chandrasekaran, Madhavan Mukund
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
15 years 11 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
MCETECH
2009
Springer
15 years 11 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin