Sciweavers

12333 search results - page 2412 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
CASSIS
2004
Springer
13 years 11 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
MA
2000
Springer
114views Communications» more  MA 2000»
13 years 11 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman
ASIACRYPT
2009
Springer
13 years 11 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
DAS
2008
Springer
13 years 9 months ago
An Empirical Measure on the Set of Symbols Occurring in Engineering Mathematics Texts
Certain forms of mathematical expression are used more often than others in practice. A quantitative understanding of actual usage can provide additional information to improve th...
Stephen M. Watt
IE
2007
13 years 9 months ago
Patterns and computer game design innovation
How can we help people design well-formed and innovative games? The design Patterns of Christopher Alexander is one methodology that has been proposed to assist in the design of w...
Kevin McGee
« Prev « First page 2412 / 2467 Last » Next »