Sciweavers

1497 search results - page 203 / 300
» Extended static checking
Sort
View
109
Voted
IJFCS
2007
93views more  IJFCS 2007»
15 years 2 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
CSL
2004
Springer
15 years 2 months ago
Arc minimization in finite-state decoding graphs with cross-word acoustic context
Recent approaches to large vocabulary decoding with finite state graphs have focused on the use of state minimization algorithms to produce relatively compact graphs. This paper e...
François Yvon, Geoffrey Zweig, George Saon
120
Voted
CN
1998
97views more  CN 1998»
15 years 2 months ago
An Architectural Description of Intelligent Network Features and Their Interactions
A brief explanation is given of the language ANISE (Architectural Notions In Service Engineering) that can be used to describe generic services as well as telecommunications servi...
Kenneth J. Turner
116
Voted
IFM
2010
Springer
124views Formal Methods» more  IFM 2010»
15 years 28 days ago
Safe Commits for Transactional Featherweight Java
Abstract. Transactions are a high-level alternative for low-level concurrencycontrol mechanisms such as locks, semaphores, monitors. A recent proposal for integrating transactional...
Thi Mai Thuong Tran, Martin Steffen
128
Voted
JCS
2010
124views more  JCS 2010»
15 years 26 days ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...