Sciweavers

4305 search results - page 121 / 861
» Analysing Protocol Implementations
Sort
View
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 2 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
14 years 1 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
DSL
1997
13 years 10 months ago
Experience with a Language for Writing Coherence Protocols
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cache coherence protocols. Cache coherence is of concern when parallel and distrib...
Satish Chandra, James R. Larus, Michael Dahlin, Br...
ACSC
2009
IEEE
14 years 1 months ago
Verification of the SIP Transaction Using Coloured Petri Nets
The Session Initiation Protocol (SIP) is one of the leading protocols for multimedia control over the Internet, including initiating, maintaining and terminating multimedia sessio...
Lin Liu
CHI
2004
ACM
14 years 9 months ago
Recent developments in text-entry error rate measurement
Previously, we defined robust and easy-to-calculate error metrics for text entry research. Herein, we announce a software implementation of this error analysis technique. We build...
R. William Soukoreff, I. Scott MacKenzie