Sciweavers

2873 search results - page 372 / 575
» Model Checking and the Mu-calculus
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 10 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
BIRTHDAY
2008
Springer
13 years 10 months ago
Some Results on the Expressive Power and Complexity of LSCs
Abstract. We survey some of the main results regarding the complexity and expressive power of Live Sequence Charts (LSCs). We first describe the two main semantics given to LSCs: a...
David Harel, Shahar Maoz, Itai Segall
FMOODS
2007
13 years 9 months ago
On Formal Analysis of OO Languages Using Rewriting Logic: Designing for Performance
Rewriting logic provides a powerful, flexible mechanism for language definition and analysis. This flexibility in design can lead to problems during analysis, as different desi...
Mark Hills, Grigore Rosu
SFP
2004
13 years 9 months ago
Disjoint forms in graphical user interfaces
Abstract: Forms are parts of a graphical user interface (GUI) that show a (structured) value and allow the user to update it. Some forms express a choice between two or more (struc...
Sander Evers, Peter Achten, Rinus Plasmeijer
MVA
1994
104views Computer Vision» more  MVA 1994»
13 years 9 months ago
Represent and Acquire Knowledge for the Development of Autonomous Vision System
The visual perceptional ability of computer systems to understand the environment is desirable in engineering design and manufacturing where automation is anticipated. I n order t...
Xiaobu Yuan