Sciweavers

3224 search results - page 498 / 645
» On Checking Model Checkers
Sort
View
VSTTE
2005
Springer
14 years 3 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
AIMSA
2004
Springer
14 years 3 months ago
Planning and Monitoring Web Service Composition
The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, a...
Marco Pistore, Fabio Barbon, Piergiorgio Bertoli, ...
DRM
2004
Springer
14 years 3 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
FASE
2004
Springer
14 years 3 months ago
Predictable Dynamic Plugin Systems
Abstract. To be able to build systems by composing a variety of components dynamically, adding and removing as required, is desirable. Unfortunately systems with evolving architect...
Robert Chatley, Susan Eisenbach, Jeff Kramer, Jeff...
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
14 years 3 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...