Sciweavers

1777 search results - page 327 / 356
» Programming Cryptographic Protocols
Sort
View
ENTCS
2002
143views more  ENTCS 2002»
13 years 8 months ago
Collecting Statistics over Runtime Executions
Abstract. We present an extension to linear-time temporal logic (LTL) that combines the temporal specification with the collection of statistical data. By collecting statistics ove...
Bernd Finkbeiner, Sriram Sankaranarayanan, Henny S...
ENTCS
2002
78views more  ENTCS 2002»
13 years 8 months ago
Separating concerns in a high-level component-based context
Building on the work of architectural description languages and aspect-oriented programming, we try to improve current visual component composition environments. In our , we intro...
Wim Vanderperren, Bart Wydaeghe
COMCOM
1998
132views more  COMCOM 1998»
13 years 8 months ago
A distributed object platform infrastructure for multimedia applications
Although distributed object computing has developed rapidly over the past decade, and is now becoming commercially important, there remain key application areas inadequately suppo...
Geoff Coulson, Michael Clarke
ICSOC
2010
Springer
13 years 7 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
SSS
2010
Springer
13 years 7 months ago
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses
Abstract. Transformations from shared memory model to wireless sensor networks (WSNs) quickly become inefficient in the presence of prevalent message losses in WSNs, and this prohi...
Mahesh Arumugam, Murat Demirbas, Sandeep S. Kulkar...