Sciweavers

3573 search results - page 692 / 715
» Reasoning about Codata
Sort
View
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 9 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 9 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ETS
2000
IEEE
182views Hardware» more  ETS 2000»
13 years 9 months ago
Conferencing in communities of learners: examples from social history and science communication
A commonly encountered view of computer conferencing focuses on peer interaction, student empowerment and a shift in both teacher and student roles. This paper argues that this vi...
Ann C. Jones, Eileen Scanlon, Canan Tosunoglu Blak...
ENTCS
2002
108views more  ENTCS 2002»
13 years 9 months ago
Bisimulation Relations for Dynamical and Control Systems
In this paper we propose a new equivalence relation for dynamical and control systems called bisimulation. As the name implies this definition is inspired by the fundamental notio...
Esfandiar Haghverdi, Paulo Tabuada, George J. Papp...
ENTCS
2002
97views more  ENTCS 2002»
13 years 9 months ago
Plan in Maude: Specifying an Active Network Programming Language
PLAN is a language designed for programming active networks, and can more generally be regarded as a model of mobile computation. PLAN generalizes the paradigm of imperative funct...
Mark-Oliver Stehr, Carolyn L. Talcott