Sciweavers

766 search results - page 73 / 154
» How to Read a Signature
Sort
View
JALC
2006
87views more  JALC 2006»
13 years 9 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
ICDE
2008
IEEE
133views Database» more  ICDE 2008»
14 years 10 months ago
XQSE: An XQuery Scripting Extension for the AquaLogic Data Services Platform
The AquaLogic Data Services Platform (ALDSP) is a BEA middleware platform for creating services that access and manipulate information drawn from multiple heterogeneous sources of ...
Vinayak R. Borkar, Michael J. Carey, Daniel Engova...
POPL
2002
ACM
14 years 9 months ago
Proving correctness of compiler optimizations by temporal logic
Many classical compiler optimizations can be elegantly expressed using rewrite rules of form: I = I if , where I, I are intermediate language instructions and is a property expre...
David Lacey, Neil D. Jones, Eric Van Wyk, Carl Chr...
CHI
2010
ACM
14 years 3 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu
SADFE
2009
IEEE
14 years 3 months ago
Automating Disk Forensic Processing with SleuthKit, XML and Python
We have developed a program called fiwalk which produces detailed XML describing all of the partitions and files on a hard drive or disk image, as well as any extractable metadat...
Simson L. Garfinkel