Sciweavers

1116 search results - page 117 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
JCC
2007
63views more  JCC 2007»
13 years 7 months ago
Quantum correction to the pair distribution function
: We report a numerical technique that allows the quantum effects of zero-point motion to be incorporated into Pair Distribution Functions calculated classically for molecules usin...
V. A. Levashov, S. J. L. Billinge, M. F. Thorpe
ICLP
2009
Springer
14 years 8 months ago
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
Abstract. We present a framework that unifies unit testing and runtime verification (as well as static verification and static debugging). A key contribution of our overall approac...
Edison Mera, Manuel V. Hermenegildo, Pedro L&oacut...
JUCS
2008
149views more  JUCS 2008»
13 years 7 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
CLUSTER
2006
IEEE
14 years 2 months ago
SLA-Based Coordinated Superscheduling Scheme for Computational Grids
The Service Level Agreement (SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologica...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
APN
2003
Springer
14 years 1 months ago
Deciding Life-Cycle Inheritance on Petri Nets
One of the key issues of object-oriented modeling is inheritance. It allows for the definition of a subclass that inherits features from some superclass. When considering the dynam...
H. M. W. (Eric) Verbeek, Twan Basten