Sciweavers

209 search results - page 18 / 42
» reading 2004
Sort
View
RTA
2004
Springer
14 years 1 months ago
TORPA: Termination of Rewriting Proved Automatically
Abstract. In this paper it is described how a combination of polynomial interpretations, recursive path order, RFC match-bounds, the dependency pair method and semantic labelling c...
Hans Zantema
WER
2004
Springer
14 years 1 months ago
Constructing Use Case Model by Using a Systematic Approach: Description of a Study
This paper presents the results of a feasability study that was carried out to evaluate the construction of Use Case Models by comparing the models with groups that used the GUCCRA...
Anderson Belgamo, Sandra Camargo Pinto Ferraz Fabb...
FC
2010
Springer
163views Cryptology» more  FC 2010»
13 years 11 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
CCGRID
2004
IEEE
13 years 11 months ago
Remote partial file access using compact pattern descriptions
We present a method for the efficient access to parts of remote files. The efficiency is achieved by using a file format independent compact pattern description, that allows to re...
Thorsten Schütt, André Merzky, Andrei ...
COMPSAC
2004
IEEE
13 years 11 months ago
Implementing Hierarchical Features in a Graphically Based Formal Modelling Language
Many developers who could benefit from building and analysing formal models of their systems are deterred from doing so by the process algebra style input languages of formal mode...
Peter Henderson, Robert John Walters, Stephen Crou...