Sciweavers

2206 search results - page 305 / 442
» On the power of coercion abstraction
Sort
View
SAMOS
2005
Springer
14 years 3 months ago
Automatic ADL-Based Assembler Generation for ASIP Programming Support
Abstract. Systems-on-Chip (SoCs) may be built upon general purpose CPUs or application-specific instruction-set processors (ASIPs). On the one hand, ASIPs allow a tradeoff betwee...
Leonardo Taglietti, José O. Carlomagno Filh...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
TRUSTBUS
2005
Springer
14 years 3 months ago
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Abstract. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and t...
Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
WOSP
2004
ACM
14 years 3 months ago
From UML activity diagrams to Stochastic Petri nets: application to software performance engineering
Over the last decade, the relevance of performance evaluation in the early stages of the software development life-cycle has been steadily rising. We honestly believe that the int...
Juan Pablo López-Grao, José Mersegue...
BIRTHDAY
2004
Springer
14 years 3 months ago
Communicating Mobile Processes
This paper presents a new model for mobile processes in occam-π. A process, embedded anywhere in a dynamically evolving network, may suspend itself mid-execution, be safely discon...
Peter H. Welch, Fred R. M. Barnes