Sciweavers

274 search results - page 30 / 55
» The Maude Formal Tool Environment
Sort
View
FSTTCS
2007
Springer
14 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
SIGADA
2005
Springer
14 years 3 months ago
Optimizing the SPARK program slicer
Recent trends in software re-engineering have included tools to extract program slices from existing Ada procedures. One such tool has already been developed that extracts program...
Ricky E. Sward, Leemon C. Baird III
COMCOM
2007
106views more  COMCOM 2007»
13 years 9 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
HICSS
2000
IEEE
153views Biometrics» more  HICSS 2000»
14 years 2 months ago
On Verifying Distributed Multithreaded Java Programs
Distributed multithreaded software systems are becoming more and more important in modern networked environment. For these systems, concurrency control and thread synchronization ...
Jessica Chen
SKG
2006
IEEE
14 years 3 months ago
Mathematics Computing Environment on the Web
With the rapid evolution of web technology and Internet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific ...
Li Liu, Yi Yang, Lian Li