Sciweavers

1703 search results - page 319 / 341
» Model interoperability via Model Driven Development
Sort
View
ISADS
1999
IEEE
14 years 1 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
LISA
2008
13 years 12 months ago
ENAVis: Enterprise Network Activities Visualization
Abstract-- With the prevalence of multi-user environments, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current ...
Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Th...
IJCAI
2007
13 years 11 months ago
Tractable Temporal Reasoning
Temporal reasoning is widely used within both Computer Science and A.I. However, the underlying complexity of temporal proof in discrete temporal logics has led to the use of simp...
Clare Dixon, Michael Fisher, Boris Konev
PTS
2003
73views Hardware» more  PTS 2003»
13 years 11 months ago
Testing Transition Systems with Input and Output Testers
The paper studies testing based on input/output transition systems, also known as input/output automata. It is assumed that a tester can never prevent an implementation under test ...
Alexandre Petrenko, Nina Yevtushenko, Jiale Huo
DKE
2007
199views more  DKE 2007»
13 years 9 months ago
QMatch - Using paths to match XML schemas
Integration of multiple heterogeneous data sources continues to be a critical problem for many application domains and a challenge for researchers world-wide. With the increasing ...
Naiyana Tansalarak, Kajal T. Claypool