Sciweavers

1490 search results - page 248 / 298
» The Logic of Authentication Protocols
Sort
View
ICTAC
2005
Springer
14 years 2 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
DATE
2000
IEEE
140views Hardware» more  DATE 2000»
14 years 1 months ago
Parallel and Distributed VHDL Simulation
This paper presents a methodology for parallel and distributed simulation of VHDL using the PDES (parallel discrete-event simulation) paradigm. To achieve better features and perf...
Dragos Lungeanu, C.-J. Richard Shi
ADC
2004
Springer
109views Database» more  ADC 2004»
14 years 17 days ago
A Model of Dynamic Resource Allocation in Workflow Systems
Current collaborative work environments are characterized by dynamically changing organizational structures. Although there have been several efforts to refine work distribution, ...
Guido Governatori, Antonino Rotolo, Shazia Wasim S...
PADL
2009
Springer
14 years 9 months ago
Toward a Practical Module System for ACL2
Abstract. Boyer and Moore's ACL2 theorem prover combines firstorder applicative Common Lisp with a computational, first-order logic. While ACL2 has become popular and is being...
Carl Eastlund, Matthias Felleisen
CADE
2008
Springer
14 years 9 months ago
Towards SMT Model Checking of Array-Based Systems
Abstract. We introduce the notion of array-based system as a suittraction of infinite state systems such as broadcast protocols or sorting programs. By using a class of quantified-...
Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, D...