Sciweavers

1407 search results - page 194 / 282
» Using Use Cases in Executable Z
Sort
View
PADS
2003
ACM
15 years 9 months ago
Hybrid Packet/Fluid Flow Network Simulation
Packet-level discrete-event network simulators use an event to model the movement of each packet in the network. This results in accurate models, but requires that many events are...
Cameron Kiddle, Rob Simmonds, Carey L. Williamson,...
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
COMPSAC
2009
IEEE
15 years 8 months ago
Towards the Operational Semantics of User-Centric Communication Models
Abstract—The pervasiveness of complex communication services and the need for end-users to play a greater role in developing communication services have resulted in the creation ...
Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Esp...
ICSE
2001
IEEE-ACM
15 years 8 months ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed
IPPS
2000
IEEE
15 years 8 months ago
On the Scheduling Algorithm of the Dynamically Trace Scheduled VLIW Architecture
In a machine that follows the dynamically trace scheduled VLIW (DTSVLIW) architecture, VLIW instructions are built dynamically through an algorithm that can be implemented in hard...
Alberto Ferreira de Souza, Peter Rounce