Sciweavers

623 search results - page 92 / 125
» Declarative Network Verification
Sort
View
WWW
2006
ACM
14 years 9 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin
DELTA
2010
IEEE
14 years 1 months ago
Design of an Infrastructural IP Dependability Manager for a Dependable Reconfigurable Many-Core Processor
Reconfigurable many-core processors have many advantages over conventionally designed devices, such as low power consumption and very high flexibility. For an increasing number of...
Hans G. Kerkhoff, Xiao Zhang
TPPP
1994
14 years 23 days ago
Advanced Component Interface Specification
We introduce a method for the specification of reactive asynchronous components with a concurrent access interface and outline its mathematical foundation. The method supports the...
Manfred Broy
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 13 days ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
COORDINATION
2006
Springer
14 years 12 days ago
A WSDL-Based Type System for WS-BPEL
We tackle the problem of providing rigorous formal foundations to current software engineering technologies for web services. We focus on two of the most used XML-based languages f...
Alessandro Lapadula, Rosario Pugliese, Francesco T...