Sciweavers

1777 search results - page 268 / 356
» Programming Cryptographic Protocols
Sort
View
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 3 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
VL
2003
IEEE
105views Visual Languages» more  VL 2003»
14 years 2 months ago
Visual composition of web services
Web services are increasingly attracting attention for their ability to provide standard interfaces to heterogeneous distributed services. Through these standard interfaces, it is...
Cesare Pautasso, Gustavo Alonso
ERLANG
2003
ACM
14 years 2 months ago
Automated test generation for industrial Erlang applications
We present an implemented technique for generating test cases from state machine specifications. The work is motivated by a need for testing of protocols and services developed b...
Johan Blom, Bengt Jonsson
AGENTS
1998
Springer
14 years 1 months ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus
IH
1998
Springer
14 years 1 months ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin