Sciweavers

BIRTHDAY
2007
Springer
14 years 3 months ago
Harnessing rCOS for Tool Support - The CoCoME Experience
Zhenbang Chen, Xiaoshan Li, Zhiming Liu, Volker St...
BIRTHDAY
2007
Springer
14 years 3 months ago
A Denotational Semantics for Handel-C
We present a denotational semantics for a fully functional subset of the Handel-C hardware compilation language [1], based on the concept of typed assertion traces. We motivate the...
Andrew Butterfield
BIRTHDAY
2007
Springer
14 years 3 months ago
Models and Software Model Checking of a Distributed File Replication System
With the Distributed File System Replication component, DFS-R, as the central theme, we present selected protocol problems and validation methods encountered during design and deve...
Nikolaj Bjørner
BIRTHDAY
2007
Springer
14 years 3 months ago
Generating Polynomial Invariants with DISCOVERER and QEPCAD
Abstract. This paper investigates how to apply the techniques on solving semi-algebraic systems to invariant generation of polynomial programs. By our approach, the generated invar...
Yinghua Chen, Bican Xia, Lu Yang, Naijun Zhan
ATC
2007
Springer
14 years 3 months ago
A Distributed Self-healing Data Store
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzow...
ATC
2007
Springer
14 years 3 months ago
An Architecture for Self-healing Autonomous Object Groups
Abstract. Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the obje...
Hein Meling
ATC
2007
Springer
14 years 3 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
ATC
2007
Springer
14 years 3 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
ATC
2007
Springer
14 years 3 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...