Sciweavers

1019 search results - page 164 / 204
» Petri Net Transformations in the
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
FOSSACS
2000
Springer
13 years 11 months ago
On Recognizable Stable Trace Languages
We relate several models of concurrency introduced in the literature in order to extend classical Mazurkiewicz traces. These are mainly Droste's concurrent automata and Arnold...
Jean-François Husson, Rémi Morin
KDD
1995
ACM
128views Data Mining» more  KDD 1995»
13 years 11 months ago
Discovery of Concurrent Data Models from Experimental Tables: A Rough Set Approach
The main objective of machine discovery is the determination of relations between data and of data models. In the paper we describe a method for discovery of data models represent...
Andrzej Skowron, Zbigniew Suraj
BPM
2007
Springer
152views Business» more  BPM 2007»
13 years 9 months ago
Behavioral Constraints for Services
Recently, we introduced the concept of an operating guideline of a service as a structure that characterizes all its properly interacting partner services. The hitherto considered ...
Niels Lohmann, Peter Massuthe, Karsten Wolf
EPEW
2008
Springer
13 years 9 months ago
Natural Language Specification of Performance Trees
The accessible specification of performance queries is a key challenge in performance analysis. To this end, we seek to combine the intuitive aspects of natural language query spec...
Lei Wang 0002, Nicholas J. Dingle, William J. Knot...