Sciweavers

1156 search results - page 152 / 232
» Compositional Methods for Information-Hiding
Sort
View
LMO
2000
13 years 9 months ago
A Metamodel for Concurrent, Object-based Programming
The development of flexible and reusable concurrent object-oriented programming ions has suffered from the inherent problem that reusability and extensibility is limited due to pos...
Jean-Guy Schneider, Markus Lumpe
AAAI
1994
13 years 9 months ago
Automated Accompaniment of Musical Ensembles
' This paper describes a computer accompaniment system capable of providing musical accompaniment for an ensemble of performers. The system tracks the performance of each musi...
Lorin Grubb, Roger B. Dannenberg
WCE
2007
13 years 9 months ago
Simulation of Transformer With Aging Insulation and Incipient Faults
Abstract—The development of the transformer insulation failure undergoes three stages: insulation aging, incipient faults and a short circuit. This paper presents a complete sche...
X. Wang, Mark Sumner, D. W. P. Thomas
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
13 years 8 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
BIS
2009
118views Business» more  BIS 2009»
13 years 8 months ago
Towards an Implementation of the EU Services Directive with Semantic Web Services
The EU Services Directive aims at easing the burdens for the EU's citizens to open up new businesses by providing a single-point-of-contact for the complete business lifecycle...
Ingo Weber, York Sure