Sciweavers

1086 search results - page 182 / 218
» Event Structures with Symmetry
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
13 years 12 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
FASE
1998
Springer
13 years 12 months ago
Specifying and Analyzing Dynamic Software Architectures
A critical issue for complex component-based systems design is the modeling and analysis of architecture. One of the complicating factors in developing architectural models is acc...
Robert Allen, Rémi Douence, David Garlan
HIM
1997
Springer
169views Multimedia» more  HIM 1997»
13 years 11 months ago
High Precision Hypertext Navigation Based on NLP Automatic Extractions
The growing popularity of hypertext navigation systems and the availability of large documentary databases is leading to the design of navigation systems that allow to explore the...
Frantz Vichot, Francis Wolinski, Joseph Tomeh, Syl...
APN
1994
Springer
13 years 11 months ago
Modelling the Work Flow of a Nuclear Waste Management Program
In this paper we describe a modelling project to improve a nuclear waste management program in charge of the creation of a new system for the permanent disposal of nuclear waste. S...
Kjeld Høyer Mortensen, Valerio O. Pinci
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 11 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis