Sciweavers

502 search results - page 33 / 101
» Visual Formalisms Revisited
Sort
View
ENC
2005
IEEE
14 years 1 months ago
Using Alloy to model-check visual design notations
This paper explores the process of validation for the syntax of a graphical notation. We define a unified specification for five of the UML diagrams used by the Discovery Method a...
Anthony J. H. Simons, Carlos Alberto Fernán...
KR
1994
Springer
13 years 11 months ago
An Ontology of Meta-Level Categories
We focus in this paper on some meta-level ontological distinctions among unary predicates, like those between concepts and assertional properties. Three are the main contributions...
Nicola Guarino, Massimiliano Carrara, Pierdaniele ...
FMICS
2006
Springer
13 years 11 months ago
"To Store or Not To Store" Reloaded: Reclaiming Memory on Demand
Behrmann et al. posed the question whether "To Store or Not To Store" [1] states during reachability analysis, in order to counter the effects of the well-known state spa...
Moritz Hammer, Michael Weber
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 9 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
IJNSEC
2008
107views more  IJNSEC 2008»
13 years 7 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang