Sciweavers

1220 search results - page 158 / 244
» Restricting grammatical complexity
Sort
View
ICSE
2007
IEEE-ACM
14 years 2 months ago
Languages for Safety-Critical Software: Issues and Assessment
Safety-critical systems (whose anomalous behavior could have catastrophic consequences such as loss of human life) are becoming increasingly prevalent; standards such as DO-178B, ...
Benjamin M. Brosgol
LPAR
2007
Springer
14 years 2 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 2 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
ODBIS
2007
Springer
150views Database» more  ODBIS 2007»
14 years 2 months ago
An Effective SPARQL Support over Relational Databases
Supporting SPARQL queries over relational databases becomes an active topic recently. However, it has not received enough consideration when SPARQL queries include restrictions on...
Jing Lu, Feng Cao, Li Ma, Yong Yu, Yue Pan
SAFECOMP
2007
Springer
14 years 2 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...