Sciweavers

1116 search results - page 161 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ANSS
2003
IEEE
14 years 1 months ago
An Event-Driven Approach to Crosstalk Noise Analysis
Crosstalk noise evaluation consists in analysing the effect of the transition of a signal - called aggressor - on its neighbours - called victims. This evaluation is based on a mo...
Pirouz Bazargan-Sabet, Patricia Renault
DBPL
2003
Springer
109views Database» more  DBPL 2003»
14 years 1 months ago
Modelling Dynamic Web Data
We introduce the Xdπ calculus, a peer-to-peer model for reasoning about dynamic web data. Web data is not just stored statically. Rather it is referenced indirectly, for example ...
Philippa Gardner, Sergio Maffeis
UML
2001
Springer
14 years 6 days ago
A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems
Abstract: A lightweight UML-based software development method for building reliable software systems is proposed. It attempts to combine the coding emphasis of Extreme Programming ...
Richard F. Paige, Jonathan S. Ostroff
CAV
2007
Springer
212views Hardware» more  CAV 2007»
13 years 11 months ago
A Tutorial on Satisfiability Modulo Theories
Abstract. Solvers for satisfiability modulo theories (SMT) check the satisfiability of first-order formulas containing operations from various theories such as the Booleans, bit-ve...
Leonardo Mendonça de Moura, Bruno Dutertre,...
IASTEDSEA
2004
13 years 9 months ago
Tube: Interactive model-integrated object-oriented programming
Software engineering is hampered by the fact that software systems quickly become so complex that they are hard to understand, evolve and maintain. Closer integration of code and ...
Axel Rauschmayer, Patrick Renner