Sciweavers

2257 search results - page 288 / 452
» Secure program partitioning
Sort
View
SAFECOMP
1999
Springer
14 years 2 months ago
Formal Design of Distributed Control Systems with Lustre
During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...
MAS
1998
Springer
153views Communications» more  MAS 1998»
14 years 2 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
OOPSLA
1997
Springer
14 years 2 months ago
Class Hierarchy Specialization
Class libraries are generally designed with an emphasis on versatility and extensibility. Applications that use a library typically exercise only part of the library’s functiona...
Frank Tip, Peter F. Sweeney
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
14 years 2 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
OOPSLA
1990
Springer
14 years 2 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller