Sciweavers

2162 search results - page 88 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
USENIX
1994
13 years 10 months ago
Latency Analysis of TCP on an ATM Network
In this paper we characterize the latency of the BSD 4.4 alpha implementation of TCP on an ATM network. Latency reduction is a difficult task, and careful analysis is the first st...
Alec Wolman, Geoffrey M. Voelker, Chandramohan A. ...
IJFCS
2008
81views more  IJFCS 2008»
13 years 8 months ago
Reachability Analysis in Verification via Supercompilation
Abstract. We present an approach to verification of parameterized systems, which is based on program transformation technique known as supercompilation. In this approach the statem...
Alexei Lisitsa, Andrei P. Nemytykh
HPCC
2005
Springer
14 years 2 months ago
Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols
Abstract. This paper presents our novel protocol design and implementation of an all-software page-based DSM system. The protocol combines the advantages of homeless and home-based...
Byung-Hyun Yu, Paul Werstein, Martin K. Purvis, St...
CADE
2010
Springer
13 years 10 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
ICIW
2007
IEEE
13 years 9 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...