نتایج جستجو برای: aldin asad abadi

تعداد نتایج: 1078  

1997
Andrew D. Gordon Paul D. Hankin Søren B. Lassen

We adopt the untyped imperative object calculus of Abadi and Cardelli as a minimal setting in which to study problems of compilation and program equivalence that arise when compiling objectoriented languages. We present both a big-step and a small-step substitution-based operational semantics for the calculus. Our first two results are theorems asserting the equivalence of our substitutionbased...

2014
MOHAMMED KASHIF

Evaluation of Performance Measures for Materials Management Process in Industrial Construction Projects. By. MOHAMMED KASHIF UL ASAD. A Thesis. with evaluating characteristics that are deemed necessary for a supplier to provide a. materials management process have been examined. logistics, performance indicators. total project costs (Construction Industry Institute, 1987). Excellence in Project...

2014
Wenchao Zhou Yun Mao Boon Thau Loo Martín Abadi Martı́n Abadi

In this paper, we present a unified declarative platform for specifying, implementing, analyzing and auditing large-scale secure information systems. Our proposed system builds upon techniques from logic-based trust management systems, declarative networking, and data analysis via provenance. First, we propose the Secure Network Datalog (SeNDlog) language that unifies Binder, a logic-based lang...

1995
Wenbo Mao

We address a common problem of a series of logics for analysis of authentication protocols due to Burrows-Abadi-Needham (BAN), Gong-Needham-Yahalom (GNY), Abadi-Tuttle (AT) and Syverson-Van Oorschot (SVO). The problem can be referred to as that these logics lack a computationally accountable means to perform an important protocol analysis step, called protocol idealization which is to transform...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Juan Carlos López Pimentel Raúl Monroy Dieter Hutter

The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [8] and OFMC [2]; and ii) theorem proving, e.g. the Isabelle inductive method [12] and Coral [13]. Complementing formal methods, Abadi and Needham’s principles aim to guide the design of security protocols in order to m...

Journal: :Arthritis + Rheuma 2023

Smith EMD, Tharmaratnam K, Al-Abadi E et al. Attainment of low disease activity and remission targets reduces the risk severe flare new damage in childhood lupus. Rheumatology (Oxford) 2022; 61(8): 3378–3389. doi: 10.1093/rheumatology/keab915. PMID: 34894234; PMCID: PMC9348762.

Journal: :IOP conference series 2022

Abstract The purpose of this investigation is to examine the effect electromagnetic polarization on groundwater softening. Samples were delivered from Samarra city, Salah-Aldin government, Iraq. treatment process was conducted using a locally manufacturing device. This device uses magnetic circuit, an iron core, which made it pole, air gap, and coil copper wire. Treated samples are achieved by ...

Journal: :Pakistan languages and humanities review 2023

This study interprets Sufi narratives and perceptions of the participants to evaluate how metaphors personifications are applied add meaning text. The ghazals by Shad Azeem Abadi (Trans. Abadi, 2008) Hazrat Shah Niaz Sag-e-dar-Niaz, 2009), were selected hold a dialogue between what was said understood. For this purpose, three tenets Hermeneutic approach i.e. hermeneutic situation, circle, fusio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید