Results 21 to 30 of about 8,202 (205)
A Dual-Engine for Early Analysis of Critical Systems [PDF]
This paper presents a framework for modeling, simulating, and checking properties of critical systems based on the Alloy language -- a declarative, first-order, relational logic with a built-in transitive closure operator. The paper introduces a new dual-
Geilmann, Ulrich +3 more
core +3 more sources
Run-time Spatial Mapping of Streaming Applications to Heterogeneous Multi-Processor Systems [PDF]
In this paper, we define the problem of spatial mapping. We present reasons why performing spatial mappings at run-time is both necessary and desirable. We propose what is—to our knowledge—the first attempt at a formal description of spatial mappings for
Braak, Timon D. ter +4 more
core +3 more sources
Análisis de la pintura rupestre del motivo 3 del sector D de QuillaRumi, Huánuco
El objetivo de esta investigación fue reinterpretar el motivo 3 del sector D de las pinturas rupestres de Quilla Rumi (Huánuco), antes considerado ornitomorfo.
Jose Alomia-Lucero, Liana Sixto-Dávila
doaj +1 more source
Dermatomiositis posterior a picadura de avispas
Resumen Presentamos el caso clinico de una mujer de 50 anos con cuadro de dermatomiositis, relacionado cronologicamente con la picadura de avispas. La dermatomiositis es una miopatia inflamatoria sistemica, de etiologia idiopatica, relacionada con debilidad muscular proximal prominentemente y asociada con lesiones cutaneas caracteristicas.
Osuna, Mónica +3 more
openaire +2 more sources
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham +4 more
core +1 more source
Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent +2 more
core +2 more sources
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
Compiling symbolic attacks to protocol implementation tests
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem +2 more
core +4 more sources
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals [PDF]
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as
A. Armando +10 more
core +1 more source
A new species of Dolichurus Latreille (Hymenoptera, Apoidea, Ampulicidae) from Brazil
Una nueva especie de Dolichurus Latreille (Hymenoptera, Apoidea, Ampilicidae) en el Brasil La descripción de Dolichurus sensei Ferreira y Lopez sp. nov. se basa en un único espécimen hembra recolectado en un fragmento de sabana neotropical de São Carlos,
R. G. Ferreira, V. M. Lopez
doaj +1 more source

