Sciweavers

1612 search results - page 254 / 323
» About models of security protocols
Sort
View
154
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Collaborative model merging
Models are important artifacts in the software development life-cycle and are often the result of a collaborative activity of multiple developers. When multiple developers modify ...
Maximilian Koegel, Helmut Naughton, Jonas Helming,...
134
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Efficient modular glass box software model checking
Glass box software model checking incorporates novel techniques to identify similarities in the state space of a model checker and safely prune large numbers of redundant states w...
Michael Roberson, Chandrasekhar Boyapati
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
16 years 15 days ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
135
Voted
IWCMC
2006
ACM
15 years 9 months ago
Proposal for a cross-layer coordination framework for next generation wireless systems
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
155
Voted
JSAC
2007
133views more  JSAC 2007»
15 years 3 months ago
On broadcasting with cooperative diversity in multi-hop wireless networks
Abstract— Cooperative diversity facilitates spatio-temporal communications without requiring the deployment of physical antenna arrays. While physical layer studies on cooperativ...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...