Computer and information sciences topic list of research papers
-
Class and Capsule Refinement in UML for Real Time
Abstract We propose refinement laws for the top level design elements of Real Time UML (UML-RT): classes and capsules. These laws can be used to develop concrete design models from abstract analysis models. Laws for introducing and decomposing...
2004 / Augusto Sampaio, Alexandre Mota, Rodrigo Ramos -
On the Semantics of Coordination Models for Distributed Systems: The LogOp Case Study
Abstract LogOp is a coordination model extending Linda by allowing a single coordination operation to dynamically address a multiplicity of possibly distributed tuple spaces. The design of LogOp raises relevant issues that are...
2004 / Ronaldo Menezes, Andrea Omicini, Mirko Viroli -
Large-scale branch contingency analysis through master/slave parallel computing2013 / Xi Yang, Cong Liu, Jianhui Wang
-
G-Reactive Systems as Coalgebras
Abstract The semantics of process calculi has traditionally been specified by labelled transition systems (LTSs), but with the development of name calculi it turned out that definitions employing reduction semantics are sometimes more natural....
2008 / Filippo Bonchi, Ugo Montanari -
Terminating Tableaux for Dynamic Epistemic Logics
Abstract Throughout the last decade, there has been an increased interest in various forms of dynamic epistemic logics to model the flow of information and the effect this flow has on knowledge in multi-agent systems. This enterprise, however, has...
2010 / Jens Ulrik Hansen -
Fresh O'Caml: Nominal Abstract Syntax for the Masses
Abstract Nominal abstract syntax, as pioneered by the 'FreshML' series of metalanguages, provides first-order tools for the representation and manipulation of syntax involving bound names, binding operations and α-equivalence. Fresh O'Caml fuses...
2006 / Mark R. Shinwell -
From Bialgebraic Semantics to Congruence Formats
Abstract A general and abstract framework to defining congruence formats for various process equivalences is presented. The framework extends bialgebraic techniques of Turi and Plotkin with an abstract coalgebraic approach to process equivalence,...
2005 / Bartek Klin -
How Recent is a Web Document?
Abstract One of the most important aspects of a Web document is its up-to-dateness or recency. Up-to-dateness is particularly relevant to Web documents because they usually contain content origining from different sources and being refreshed at...
2006 / Bo Hu, Florian Lauck, Jan Scheffczyk -
Formalizing Web Service Choreographies
Abstract Current Web service choreography proposals, such as BPEL4WS, BPSS, WSFL, WSCDL or WSCI, provide notations for describing the message flows in Web service collaborations. However, such proposals remain at the descriptive level, without...
2004 / Antonio Brogi, Carlos Canal, Ernesto Pimentel, Antonio Vallecillo -
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic
Abstract Authenticated key exchange protocols have been developed to establish secure channel on the Internet. In this paper, we consider following attacks against an authenticated key exchange using shared secret: eavesdropping, DoS attack, replay...
2005 / Kenji Imamoto, Kouichi Sakurai -
Preface2008 / Joost Visser, Victor Winter
-
Type-Directed Compilation for Multicore Programming
Abstract In this paper, we outline a general picture of our ongoing work on a compilation and execution framework for a class of multicore CPUs [Gelsinger, P., P. Gargini, G. Parker and A. Yu, Microprocessors circa 2000, IEEE SPectrum (1989), pp....
2009 / Kohei Honda, Vasco T. Vasconcelos, Nobuko Yoshida -
A Reflective Higher-order Calculus
Abstract The π-calculus is not a closed theory, but rather a theory dependent upon some theory of names. Taking an operational view, one may think of the π-calculus as a procedure that when handed a theory of names provides a theory of processes...
2005 / L.G. Meredith, Matthias Radestock -
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Abstract As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed ...
2010 / Dusko Pavlovic, Catherine Meadows -
Fast and Flexible Compression for Web Search Engines
Abstract In this paper we present the adaptation of a compression technique, specially designed to compress large textual databases, to the peculiarities of web search engines. The (s,c)-Dense Code belongs to a new category of...
2005 / Antonio Fariña, Nieves R. Brisaboa, Cristina París, José R. Paramá -
A Nonstandard Characterisation of the Type-structure of Continuous Functionals Over the Reals2004 / Dag Normann
-
Preface2008 / Luca Compagna, Volkmar Lotz, Fabio Massacci
-
WAVer: A Model Checking-based Tool to Verify Web Application Design
Abstract Web Applications are becoming more and more widespread and efficient, then an increase of their reliability is now strongly required. Hence methods to support design and automatically perform validation of a Web Application (WA) could be...
2006 / D. Castelluccia, M. Mongiello, M. Ruta, R. Totaro -
A Signcryption-based Secure Localization Scheme in Wireless Sensor Networks
Abstract Localization technology in wireless sensor networks has great significance for theoretical study and practical applications. However, most current localization schemes have failed to pay enough attention to security issues. In this paper,...
2012 / Ting Zhang, Jingsha He, Xiaohui Li, Qian Wei -
A Positioning Method in Wireless Sensor Networks using Genetic Algorithms
Abstract The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challenges in wireless sensor networks. We investigate intelligent...
2012 / Mojtaba Romoozi, Hossein Ebrahimpour-komleh