Sciweavers

4305 search results - page 50 / 861
» Analysing Protocol Implementations
Sort
View
RTA
2009
Springer
14 years 3 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
LCN
2007
IEEE
14 years 3 months ago
Prototyping Service Discovery and Usage in Wireless Sensor Networks
—Heterogeneous Wireless Sensor Networks (WSNs) are envisioned to provide different types of services in an open and dynamic environment. This paper presents the design, implement...
Raluca Marin-Perianu, Hans Scholten, Paul J. M. Ha...
POPL
2011
ACM
12 years 11 months ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
FPL
2005
Springer
79views Hardware» more  FPL 2005»
14 years 2 months ago
FPGA-based implementation and comparison of recursive and iterative algorithms
The paper analyses and compares alternative iterative and recursive implementations of FPGA circuits for various problems. Two types of recursive calls have been examined, namely ...
Valery Sklyarov, Iouliia Skliarova, Bruno Figueire...
ISCAS
2003
IEEE
95views Hardware» more  ISCAS 2003»
14 years 2 months ago
Analog representation and digital implementation of OFDM systems
Many existing results on the analysis of OFDM systems are based on an analog representation. The actual implementation of OFDM transmitters typically consists of a discrete DFT ma...
Yuan-Pei Lin, See-May Phoong