Sciweavers

39 search results - page 5 / 8
» Security-Typed Languages for Implementation of Cryptographic...
Sort
View
IDC
2009
Springer
14 years 2 months ago
A Protocol for Execution of Distributed Logic Programs
In the last fifteen years many work in logic programming has focussed on parallel implementations both in shared memory and in distributed memory multiprocessor systems. In both c...
László Aszalós, Andreas Herzi...
COMPSAC
2006
IEEE
14 years 1 months ago
A Practical Approach for Automated Test Case Generation using Statecharts
This paper presents an approach for automated test case generation using a software specification modeled in Statecharts. The steps defined in such approach involve: translation o...
Valdivino A. Santiago, Ana Silvia Martins do Amara...
COMPSAC
2005
IEEE
14 years 1 months ago
Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services
Web services and service-oriented architecture are emerging technologies that are changing the way we develop and use computer software. Due to the standardization of web services...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Hu...
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
14 years 1 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...