Sciweavers

11588 search results - page 68 / 2318
» Will They Like This
Sort
View
CADE
2006
Springer
14 years 9 months ago
Cut-Simulation in Impredicative Logics
Abstract. We investigate cut-elimination and cut-simulation in impredicative (higher-order) logics. We illustrate that adding simple axioms such as Leibniz equations to a calculus ...
Christoph Benzmüller, Chad E. Brown, Michael ...
WISTP
2010
Springer
14 years 4 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
AINA
2008
IEEE
14 years 3 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...
DATE
2007
IEEE
93views Hardware» more  DATE 2007»
14 years 3 months ago
Testing in the year 2020
Testing today of a several hundred million transistor System-on-Chip with analog, RF blocks, many processor cores and tens of memories is a huge task. What will test technology be...
Rajesh Galivanche, Rohit Kapur, Antonio Rubio
IPPS
2007
IEEE
14 years 3 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White