Sciweavers

1802 search results - page 263 / 361
» Model-based Theory Combination
Sort
View
PERVASIVE
2005
Springer
14 years 2 months ago
Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling
The retail store environment is a challenging application area for Pervasive Computing technologies. It has demanding base conditions due to the number and complexity of the interd...
Albert Krohn, Tobias Zimmer, Michael Beigl, Christ...
PKC
2005
Springer
102views Cryptology» more  PKC 2005»
14 years 2 months ago
Experimenting with Faults, Lattices and the DSA
We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be the first (publicly reported) physical experimen...
David Naccache, Phong Q. Nguyen, Michael Tunstall,...
PPDP
2005
Springer
14 years 2 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
PPDP
2005
Springer
14 years 2 months ago
Trace effects and object orientation
fects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type and eff...
Christian Skalka
RE
2005
Springer
14 years 2 months ago
Using Occurrence Properties of Defect Report Data to Improve Requirements
Defect reports generated for faults found during testing provide a rich source of information regarding problematic phrases used in requirements documents. These reports indicate ...
Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lut...