Sciweavers

1490 search results - page 264 / 298
» The Logic of Authentication Protocols
Sort
View
OSDI
2006
ACM
14 years 9 months ago
Distributed Directory Service in the Farsite File System
We present the design, implementation, and evaluation of a fully distributed directory service for Farsite, a logically centralized file system that is physically implemented on a...
John R. Douceur, Jon Howell
TACAS
2010
Springer
142views Algorithms» more  TACAS 2010»
14 years 3 months ago
Tracking Heaps That Hop with Heap-Hop
Abstract. Heap-Hop is a program prover for concurrent heap-manipulating programs that use Hoare monitors and message-passing synchronization. Programs are annotated with pre and po...
Jules Villard, Étienne Lozes, Cristiano Cal...
ASPDAC
2009
ACM
111views Hardware» more  ASPDAC 2009»
14 years 3 months ago
A UML-based approach for heterogeneous IP integration
- With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ...
Zhenxin Sun, Weng-Fai Wong
ICAIL
2009
ACM
14 years 3 months ago
Coherence-driven argumentation to norm consensus
In this paper coherence-based models are proposed as an alternative to logic-based BDI and argumentation models for the reasoning of normative agents. A model is provided for how t...
Sindhu Joseph, Henry Prakken
IEEEARES
2008
IEEE
14 years 3 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...