Sciweavers

773 search results - page 87 / 155
» Report on a Practical Application of ASMs in Software Design
Sort
View
MABS
2004
Springer
14 years 2 months ago
Smooth Scaling Ahead: Progressive MAS Simulation from Single PCs to Grids
The emerging ”Computational Grid” infrastructure poses many new opportunities for the developing science of large scale multiagent simulation. The ability to migrate agent expe...
Les Gasser, Kelvin Kakugawa, Brant Chee, Marc Este...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
STTT
1998
130views more  STTT 1998»
13 years 8 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
TSE
2012
11 years 11 months ago
Automated Abstractions for Contract Validation
d Abstractions for Contract Validation Guido de Caso, Víctor Braberman, Diego Garbervetsky and Sebastián Uchitel —Pre/post condition-based specifications are common-place in a...
Guido de Caso, Víctor A. Braberman, Diego G...