Sciweavers

525 search results - page 87 / 105
» Model Checking Systems of Replicated Processes with Spin
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
13 years 8 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
14 years 28 days ago
Scheduling of Adaptive Multimedia Documents
Multimedia documents are of importance in several application areas, such as education, training, advertising and entertainment. Since multimedia documents may comprise continuous...
Stefan Wirag
ESOP
2008
Springer
13 years 10 months ago
Open Bisimulation for the Concurrent Constraint Pi-Calculus
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Maria Grazia Buscemi, Ugo Montanari
BPM
2004
Springer
148views Business» more  BPM 2004»
14 years 11 days ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
FDL
2004
IEEE
14 years 10 days ago
A Formal Verification Approach for IP-based Designs
This paper proposes a formal verification methodology which is smoothly integrated with component-based system-level design, using a divide and conquer approach. The methodology a...
Daniel Karlsson, Petru Eles, Zebo Peng