Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Compliance in behavioural contracts: a brief survey
Behavioural contracts are formal specifications of interaction protocols between two or more
distributed services. Despite the heterogeneous nature of the formalisms for behavioural …
distributed services. Despite the heterogeneous nature of the formalisms for behavioural …
Bring your own device, securely
Modern mobile devices offer users powerful computational capabilities and complete
customization. As a matter of fact, today smartphones and tablets have remarkable hardware …
customization. As a matter of fact, today smartphones and tablets have remarkable hardware …
[PDF][PDF] Automata for specifying and orchestrating service contracts
D Basile, P Degano, GL Ferrari - Logical Methods in Computer …, 2017 - lmcs.episciences.org
An approach to the formal description of service contracts is presented in terms of automata.
We focus on the basic property of guaranteeing that in the multi-party composition of …
We focus on the basic property of guaranteeing that in the multi-party composition of …
Semantics-based design for secure web services
M Bartoletti, P Degano, GL Ferrari… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We outline a methodology for designing and composing services in a secure manner. In
particular, we are concerned with safety properties of service behaviour. Services can …
particular, we are concerned with safety properties of service behaviour. Services can …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
Formal modeling and reasoning about the android security framework
Android OS is currently the most widespread mobile operating system and is very likely to
remain so in the near future. The number of available Android applications will soon reach …
remain so in the near future. The number of available Android applications will soon reach …
Security Protocols: Principles and Calculi: Tutorial Notes
M Abadi - International School on Foundations of Security …, 2006 - Springer
This paper is a basic introduction to some of the main themes in the design and analysis of
security protocols. It includes a brief explanation of the principles of protocol design and of a …
security protocols. It includes a brief explanation of the principles of protocol design and of a …
Service net algebra based on logic Petri nets
Q Hu, Y Du, SX Yu - Information Sciences, 2014 - Elsevier
Web service process reuse can help us efficiently to construct a new service or service
process by using the existing service processes generated by service composition. Since …
process by using the existing service processes generated by service composition. Since …
Professional engineering pathways study: A longitudinal study of early career preparedness and decision-making
This paper introduces the Professional Engineering Pathways Study (PEPS), a three-year
study aimed at develo** new understandings of early career engineering career …
study aimed at develo** new understandings of early career engineering career …
Model checking usage policies
We propose a model for specifying, analysing and enforcing safe usage of resources. Our
usage policies allow for parametricity over resources, and they can be enforced through …
usage policies allow for parametricity over resources, and they can be enforced through …