Sciweavers

5255 search results - page 993 / 1051
» Formal Methods for Privacy
Sort
View
POPL
2000
ACM
14 years 1 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
IUI
1998
ACM
14 years 1 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta
ICAIL
2007
ACM
14 years 27 days ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
ICSE
2000
IEEE-ACM
14 years 18 days ago
Producing more reliable software: mature software engineering process vs. state-of-the-art technology?
: Producing More Reliable Software: Mature Software Engineering Process vs. State-of-the-Art Technology? A customer of high assurance software recently sponsored a software enginee...
James C. Widmaier
AFRICACRYPT
2010
Springer
14 years 10 days ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley