Sciweavers

1818 search results - page 280 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
123
Voted
IEAAIE
2005
Springer
15 years 9 months ago
Agent Support for a Grid-Based High Energy Physics Application
Abstract. This paper presents an agent system ASGARD-0, that provides monitoring for the success or failure of Grid jobs in a High Energy Physics application. This application area...
Aman Sahani, Ian D. Mathieson, Lin Padgham
IH
2005
Springer
15 years 9 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
15 years 9 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
132
Voted
CAISE
2004
Springer
15 years 9 months ago
Design and Implementation of the YAWL System
This paper describes the implementation of a system supporting YAWL (Yet Another Workflow Language). YAWL is based on a rigorous analysis of existing workflow management systems ...
Wil M. P. van der Aalst, Lachlan Aldred, Marlon Du...
118
Voted
FOSSACS
2004
Springer
15 years 8 months ago
Deriving Bisimulation Congruences in the DPO Approach to Graph Rewriting
Abstract. Motivated by recent work on the derivation of labelled transitions and bisimulation congruences from unlabelled reaction rules, we show how to solve this problem in the D...
Hartmut Ehrig, Barbara König