Sciweavers

1580 search results - page 57 / 316
» Modules for Crosscutting Models
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
CADE
2005
Springer
14 years 8 months ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
WSFM
2007
Springer
14 years 1 months ago
From BPEL to SRML: A Formal Transformational Approach
The SENSORIA Reference Modelling Language (SRML) provides primitives for modelling business processes in a technology agnostic way. At the core of SRML is the notion of module as a...
Laura Bocchi, Yi Hong, Antónia Lopes, Jos&e...
DAC
1998
ACM
14 years 8 months ago
Functional Vector Generation for HDL Models Using Linear Programming and 3-Satisfiability
Abstract-Our strategy for automatic generation of functional vectors is based on exercising selected paths in the given hardware description language (HDL) model. The HDL model des...
Farzan Fallah, Srinivas Devadas, Kurt Keutzer
WSC
2000
13 years 9 months ago
Cluster tool simulation assists the system design
Designing semiconductor cluster tool systems is a complicated task due to the nature of automatic operations and various configurations of modules and task response priorities of ...
Sarayuth Poolsup, Salil Deshpande