Sciweavers

2432 search results - page 419 / 487
» Cryptographic logical relations
Sort
View
SECON
2007
IEEE
15 years 10 months ago
High-Level Application Development is Realistic for Wireless Sensor Networks
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
Marcin Karpinski, Vinny Cahill
CAV
2007
Springer
86views Hardware» more  CAV 2007»
15 years 10 months ago
From Liveness to Promptness
Liveness temporal properties state that something “good” eventually happens, e.g., every request is eventually granted. In Linear Temporal Logic (LTL), there is no a priori bo...
Orna Kupferman, Nir Piterman, Moshe Y. Vardi
CCS
2007
ACM
15 years 10 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
HOLOMAS
2007
Springer
15 years 10 months ago
Information Agents Handling Semantic Data as an Extension to Process Monitoring Systems
An approach to extend process monitoring with the help of information agents (IA) handling semantic data is presented in this paper. According to this approach, an operator of a pr...
Teppo Pirttioja, Ilkka Seilonen, Antti Pakonen, Aa...
159
Voted
ISNN
2007
Springer
15 years 10 months ago
A Connectionist Thematic Grid Predictor for Pre-parsed Natural Language Sentences
Abstract. Inspired on psycholinguistics and neuroscience, a symbolicconnectionist hybrid system called θ-Pred (Thematic Predictor for natural language) is proposed, designed to re...
João Luís Garcia Rosa