Sciweavers

264 search results - page 45 / 53
» Verifying Dribble Agents
Sort
View
SAC
2006
ACM
14 years 4 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
WORDS
2005
IEEE
14 years 4 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
ICFEM
2005
Springer
14 years 4 months ago
Visualizing and Simulating Semantic Web Services Ontologies
The development of Web Services has transformed the World Wide Web into a more application-aware information portal. The various standards ensure that Web Services are interpretabl...
Jun Sun 0001, Yuan-Fang Li, Hai H. Wang, Jing Sun
EMSOFT
2004
Springer
14 years 4 months ago
Conservative approximations for heterogeneous design
Embedded systems are electronic devices that function in the context of a real environment, by sensing and reacting to a set of stimuli. Because of their close interaction with th...
Roberto Passerone, Jerry R. Burch, Alberto L. Sang...
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
14 years 4 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...