Sciweavers

1092 search results - page 190 / 219
» Understanding Context Before Using It
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng
EUROCRYPT
2004
Springer
14 years 1 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
CSMR
2000
IEEE
14 years 1 days ago
Analyzing Java Software by Combining Metrics and Program Visualization
Shimba, a prototype reverse engineering environment, has been built to support the understanding of Java software. Shimba uses Rigi and SCED to analyze, visualize, and explore the...
Tarja Systä, Ping Yu, Hausi A. Müller
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
BMCBI
2006
95views more  BMCBI 2006»
13 years 7 months ago
Estimate haplotype frequencies in pedigrees
Background: Haplotype analysis has gained increasing attention in the context of association studies of disease genes and drug responsivities over the last years. The potential us...
Qiangfeng Zhang, YuZhong Zhao, Guoliang Chen, Yun ...