Sciweavers

1490 search results - page 264 / 298
» The Logic of Authentication Protocols
Sort
View
140
Voted
OSDI
2006
ACM
16 years 4 months ago
Distributed Directory Service in the Farsite File System
We present the design, implementation, and evaluation of a fully distributed directory service for Farsite, a logically centralized file system that is physically implemented on a...
John R. Douceur, Jon Howell
TACAS
2010
Springer
142views Algorithms» more  TACAS 2010»
15 years 10 months ago
Tracking Heaps That Hop with Heap-Hop
Abstract. Heap-Hop is a program prover for concurrent heap-manipulating programs that use Hoare monitors and message-passing synchronization. Programs are annotated with pre and po...
Jules Villard, Étienne Lozes, Cristiano Cal...
ASPDAC
2009
ACM
111views Hardware» more  ASPDAC 2009»
15 years 10 months ago
A UML-based approach for heterogeneous IP integration
- With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ...
Zhenxin Sun, Weng-Fai Wong
ICAIL
2009
ACM
15 years 10 months ago
Coherence-driven argumentation to norm consensus
In this paper coherence-based models are proposed as an alternative to logic-based BDI and argumentation models for the reasoning of normative agents. A model is provided for how t...
Sindhu Joseph, Henry Prakken
IEEEARES
2008
IEEE
15 years 10 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...