Sciweavers

1104 search results - page 41 / 221
» A Comparison of State-Based Modelling Tools for Model Valida...
Sort
View
PTS
2008
123views Hardware» more  PTS 2008»
13 years 10 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
DATE
2009
IEEE
130views Hardware» more  DATE 2009»
14 years 3 months ago
An accurate interconnect thermal model using equivalent transmission line circuit
Abstract—This paper presents an accurate interconnect thermal model for analyzing the temperature distribution of an on-chip interconnect wire. The model addresses the ambient te...
Baohua Wang, Pinaki Mazumder
VVEIS
2007
13 years 10 months ago
Transformation of BPMN Models for Behaviour Analysis
Abstract. In industry, many business processes are modelled and stored in Enterprise Information Systems (EIS). Tools supporting the verification and validation of business process...
Ivo Raedts, Marija Petkovic, Yaroslav S. Usenko, J...
RE
1999
Springer
14 years 1 months ago
Formal Modeling of Space Shuttle Software Change Requests using SCR
This paper describes a feasibility study into the use of a formal requirements modeling method (SCR) to assist with Independent Verification and Validation of change requests for ...
Virginie Wiels, Steve M. Easterbrook
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...