Sciweavers

491 search results - page 78 / 99
» RETNA: From Requirements to Testing in a Natural Way
Sort
View
OTM
2005
Springer
14 years 4 months ago
Semantic Transformation of Web Services
Abstract. Web services have become the predominant paradigm for the development of distributed software systems. Web services provide the means to modularize software in a way that...
David Bell, Sergio de Cesare, Mark Lycett
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 4 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
MOBICOM
1999
ACM
14 years 3 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
ECAI
2004
Springer
14 years 4 months ago
A Context-Based Model of Attention
d abstract)1 Niek Bergboer Eric Postma Jaap van den Herik Institute for Knowledge and Agent Technology, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht It is well known t...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
CAV
1999
Springer
119views Hardware» more  CAV 1999»
14 years 3 months ago
A Theory of Restrictions for Logics and Automata
BDDs and their algorithms implement a decision procedure for Quanti ed Propositional Logic. BDDs are a kind of acyclic automata. Unrestricted automata (recognizing unbounded string...
Nils Klarlund