Sciweavers

893 search results - page 102 / 179
» Environment Assumptions for Synthesis
Sort
View
SIGADA
2005
Springer
14 years 1 months ago
Optimizing the SPARK program slicer
Recent trends in software re-engineering have included tools to extract program slices from existing Ada procedures. One such tool has already been developed that extracts program...
Ricky E. Sward, Leemon C. Baird III
NSPW
2004
ACM
14 years 1 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
SC
2004
ACM
14 years 1 months ago
Improving Throughput for Grid Applications with Network Logistics
This work describes a technique for improving network performance in Grid environments that we refer to as “logistics.” We demonstrate that by using storage and cooperative fo...
D. Martin Swany
UIST
2004
ACM
14 years 1 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
FATES
2004
Springer
14 years 1 months ago
Online Testing of Real-time Systems Using Uppaal
We present the development of T-UPPAAL — a new tool for online black-box testing of real-time embedded systems from non-deterministic timed automata specifications. It is based ...
Kim Guldstrand Larsen, Marius Mikucionis, Brian Ni...