Sciweavers

282 search results - page 32 / 57
» Description Logics for Shape Analysis
Sort
View
CAISE
2008
Springer
14 years 28 days ago
Formal Modeling and Discrete-Time Analysis of BPEL Web Services
Abstract. Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (Soa) paradigm. We propose in this paper a t...
Radu Mateescu, Sylvain Rampacek
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 11 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
ICCAD
2002
IEEE
176views Hardware» more  ICCAD 2002»
14 years 7 months ago
High capacity and automatic functional extraction tool for industrial VLSI circuit designs
In this paper we present an advanced functional extraction tool for automatic generation of high-level RTL from switch-level circuit netlist representation. The tool is called FEV...
Sasha Novakovsky, Shy Shyman, Ziyad Hanna
ICDAR
2009
IEEE
13 years 8 months ago
A Generic Form Processing Approach for Large Variant Templates
In today's world, form processing systems must be able to recognize mutant forms that appear to be based on differing templates but are actually only a variation of the origi...
Yaakov Navon, Ella Barkan, Boaz Ophir
IJISEC
2008
101views more  IJISEC 2008»
13 years 11 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna