Sciweavers

1347 search results - page 165 / 270
» A Web-based requirements analysis tool
Sort
View
ACSC
2007
IEEE
14 years 2 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
COMPLIFE
2006
Springer
14 years 1 months ago
Software Supported Modelling in Pharmacokinetics
A powerful new software concept to physiologically based pharmacokinetic (PBPK) modelling of drug disposition is presented. It links the inherent modular understanding in pharmacol...
Regina Telgmann, Max von Kleist, Wilhelm Huisinga
CONCUR
2006
Springer
14 years 1 months ago
Concurrent Rewriting for Graphs with Equivalences
Several applications of graph rewriting systems (notably, some encodings of calculi with name passing) require rules which, besides deleting and generating graph items, are able to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
HICSS
1995
IEEE
101views Biometrics» more  HICSS 1995»
14 years 1 months ago
Prototyping of parallel and distributed object-oriented systems: the PDC model and its environment
To ease the implementation of distributed objectoriented systems we developed the PDC technique (Proxy/ Dispatcher/Collocutor technique), a simple and pragmatic approach to allow ...
Rainer Weinreich, Reinhold Plösch
CAV
2010
Springer
173views Hardware» more  CAV 2010»
14 years 1 months ago
A Model Checker for AADL
We present a graphical toolset for verifying AADL models, which are gaining widespread acceptance in aerospace, automobile and avionics industries for comprehensively specifying sa...
Marco Bozzano, Alessandro Cimatti, Joost-Pieter Ka...