Sciweavers

ICALP
2005
Springer
14 years 6 months ago
Decidability and Complexity Results for Timed Automata via Channel Machines
Abstract. This paper is concerned with the language inclusion problem for timed automata: given timed automata A and B, is every word accepted by B also accepted by A? Alur and Dil...
Parosh Aziz Abdulla, Johann Deneux, Joël Ouak...
ICALP
2005
Springer
14 years 6 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
ICALP
2005
Springer
14 years 6 months ago
Preservation Under Extensions on Well-Behaved Finite Structures
A class of relational structures is said to have the extension preservation property if every first-order sentence that is preserved under extensions on the class is equivalent t...
Albert Atserias, Anuj Dawar, Martin Grohe
ICALP
2005
Springer
14 years 6 months ago
Noisy Turing Machines
Abstract. Turing machines exposed to a small stochastic noise are considered. An exact characterisation of their (≈ Π0 2 ) computational power (as noise level tends to 0) is obt...
Eugene Asarin, Pieter Collins
GI
2005
Springer
14 years 6 months ago
Die ergonomischen Erfindungen der Zuse-Maschinen
: Konrad Zuses frühe vollautomatische Rechenmaschinen Z1-Z4 zeichnen sich nicht nur durch das Prinzip des minimalen Entwurfs, Boolescher Logik, binärer Gleitkommazahlen, usw. aus...
Horst Zuse
GI
2005
Springer
14 years 6 months ago
Analysis and Design Techniques for Service-Oriented Development and Integration
: Service-Oriented Architectures (SOAs) have been established as an IT strategy to support the on demand goal of business agility. Web services standards and their implementations ...
Olaf Zimmermann, Niklas Schlimm, Günter Walle...
GI
2005
Springer
14 years 6 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
GI
2005
Springer
14 years 6 months ago
On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks
: In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provi...
Thiemo Voigt, Adam Dunkels, Torsten Braun
GI
2005
Springer
14 years 6 months ago
Intrusion Detection and Failure Recovery in Sensor Nodes
Harald Vogt, Matthias Ringwald, Mario Strasser