Sciweavers

5227 search results - page 933 / 1046
» Enterprise modeling using class and instance models
Sort
View
VMCAI
2005
Springer
14 years 1 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
APN
2004
Springer
14 years 1 months ago
Time Petri Nets with Inhibitor Hyperarcs. Formal Semantics and State Space Computation
Abstract. In this paper, we define Time Petri Nets with Inhibitor Hyperarcs (IHTPN) as an extension of T-time Petri nets where time is associated with transitions. In this model, ...
Olivier H. Roux, Didier Lime
CARDIS
2004
Springer
150views Hardware» more  CARDIS 2004»
14 years 1 months ago
Enforcing High-Level Security Properties for Applets
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
Mariela Pavlova, Gilles Barthe, Lilian Burdy, Mari...
SC
2003
ACM
14 years 1 months ago
Compiler Support for Exploiting Coarse-Grained Pipelined Parallelism
The emergence of grid and a new class of data-driven applications is making a new form of parallelism desirable, which we refer to as coarse-grained pipelined parallelism. This pa...
Wei Du, Renato Ferreira, Gagan Agrawal
ISCAS
2002
IEEE
108views Hardware» more  ISCAS 2002»
14 years 25 days ago
Optimal adaptive bandwidth monitoring for QoS based retrieval
—Network aware multimedia delivery applications are a class of applications that provide certain level of quality of service (QoS) guarantees to end users while not assuming unde...
Yinzhe Yu, Anup Basu, Irene Cheng