Sciweavers

689 search results - page 50 / 138
» Encapsulation theory fundamentals
Sort
View
LPAR
2005
Springer
14 years 3 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
MPC
2004
Springer
123views Mathematics» more  MPC 2004»
14 years 3 months ago
Constructing Polymorphic Programs with Quotient Types
The efficient representation and manipulation of data is one of the fundamental tasks in the construction of large software systems. Parametric polymorphism has been one of the mo...
Michael Abbott, Thorsten Altenkirch, Neil Ghani, C...
ICRA
2002
IEEE
131views Robotics» more  ICRA 2002»
14 years 2 months ago
Acquisition and Embodiment of Motion Elements in Closed Mimesis Loop
It is needed for humanoid to acquire not only just a trajectory but also aim of the behavior and symbolic information during behavior development. We have proposed the mimesis sys...
Tetsunari Inamura, Iwaki Toshima, Yoshihiko Nakamu...
FOCS
1997
IEEE
14 years 2 months ago
Storage Management for Evolving Databases
The problem of maintaining data that arrives continuously over time is increasingly prevalent in databases and digital libraries. Building on a model for sliding-window indices de...
Jon M. Kleinberg, Rajeev Motwani, Prabhakar Raghav...
CSEE
2006
Springer
14 years 1 months ago
SimVBSE: Developing a Game for Value-Based Software Engineering
The development of games in aid of improving and enriching a student's learning experience is again on the rise. The beer game [6] in the field of system dynamics was develop...
Apurva Jain, Barry W. Boehm