Sciweavers

1264 search results - page 126 / 253
» Towards Theory Translation
Sort
View
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
LISP
2002
81views more  LISP 2002»
13 years 8 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
HT
2010
ACM
13 years 6 months ago
Citation based plagiarism detection: a new approach to identify plagiarized work language independently
This paper describes a new approach towards detecting plagiarism and scientific documents that have been read but not cited. In contrast to existing approaches, which analyze docu...
Bela Gipp, Jöran Beel
SIAMMA
2010
122views more  SIAMMA 2010»
13 years 3 months ago
Asymptotic Flocking Dynamics for the Kinetic Cucker-Smale Model
In this paper, we analyse the asymptotic behavior of solutions of the continuous kinetic version of flocking by Cucker and Smale [16], which describes the collective behavior of an...
J. A. Carrillo, M. Fornasier, J. Rosado, G. Toscan...
SIGMOBILE
2010
147views more  SIGMOBILE 2010»
13 years 3 months ago
TCPSpeaker: clean and dirty sides of the same slate
As new approaches toward clean-slate network transport continue to emerge in the wireless domain and beyond, so grows the difficulty of conducting reproducible, head-to-head evalu...
Dan Levin, Harald Schiöberg, Ruben Merz, Cigd...