Sciweavers

4111 search results - page 751 / 823
» Security, Protocols, and Trust
Sort
View
SEFM
2007
IEEE
14 years 3 months ago
Verifying the Mondex Case Study
The Mondex Case study is still the most substantial contribution to the Grand Challenge repository. It has been the target of a number of formal verification efforts. Those effor...
Peter H. Schmitt, Isabel Tonin
APNOMS
2007
Springer
14 years 3 months ago
Standby Power Control Architecture in Context-Aware Home Networks
Standby power is the energy consumed by appliances when they are not performing their main functions or when they are switched off. In this paper, we propose a Host-Agent based sta...
Joon Heo, Jihyuk Heo, Choong Seon Hong, Seok Bong ...
ICLP
2007
Springer
14 years 3 months ago
Universal Timed Concurrent Constraint Programming
Abstract In this doctoral work we aim at developing a rich timed concurrent constraint (tcc) based language with strong ties to logic. The new calculus called Universal Timed Concu...
Carlos Olarte, Catuscia Palamidessi, Frank Valenci...
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 3 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
SAFECOMP
2007
Springer
14 years 3 months ago
Improving Test Coverage for UML State Machines Using Transition Instrumentation
We discuss the problem of generating test suites from UML state machines and present a method to extend the capabilities of existing automated test case generators. Current tools p...
Mario Friske, Bernd-Holger Schlingloff