Sciweavers

1791 search results - page 14 / 359
» Behavioral Operations
Sort
View
CCR
2004
95views more  CCR 2004»
13 years 7 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
SNPD
2004
13 years 8 months ago
Addressing State Explosion in Behavior Protocol Verification
A typical problem formal verification faces is the size of the model of a system being verified. Even for a small system, the state space of the model tends to grow exponentially (...
Martin Mach, Frantisek Plasil
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 21 days ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
UML
2000
Springer
13 years 11 months ago
From Use Cases to System Operation Specifications
The purpose of this paper is to first showcase the concept of an operation schema--a precise form of system-level operation specification--and secondly show how operation schemas e...
Shane Sendall, Alfred Strohmeier
APSEC
2006
IEEE
13 years 9 months ago
Using Operational Architecture to Model Embedded Software
Almost methods in embedded software modeling take software architecture as one of the crucial parts of the design process. Since a principal role of embedded software is the inter...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae