Sciweavers

1123 search results - page 213 / 225
» Analysis of Timed Processes with Data Using Algebraic Transf...
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
ICDCS
2003
IEEE
14 years 2 months ago
Monitoring and Characterization of Component-Based Systems with Global Causality Capture
Current software development techniques and tools lack the capability to characterize function call chains in multithreaded and distributed applications built upon component techn...
Jun Li
HYBRID
2001
Springer
14 years 1 months ago
Assume-Guarantee Reasoning for Hierarchical Hybrid Systems
Abstract. The assume-guarantee paradigm is a powerful divide-andconquer mechanism for decomposing a veri cation task about a system into subtasks about the individual components of...
Thomas A. Henzinger, Marius Minea, Vinayak S. Prab...
EUROMICRO
2009
IEEE
14 years 21 days ago
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs
Runtime quality of software, such as availability and throughput, depends on architectural factors and execution environment characteristics (e.g. CPU speed, network latency). Alth...
Anakreon Mentis, Panagiotis Katsaros, Lefteris Ang...
ICANN
1997
Springer
14 years 11 days ago
Topology Representing Networks for Intrinsic Dimensionality Estimation
Abstract. In this paper we compare two methods for intrinsic dimensionality (ID) estimation based on optimally topology preserving maps (OTPMs). The rst one is a direct approach, w...
Jörg Bruske, Gerald Sommer