Sciweavers

2373 search results - page 134 / 475
» Complexities for generalized models of self-assembly
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
GG
2008
Springer
15 years 5 months ago
Workshop on Graph Computation Models
A variety of computation models have been developed using graphs and graph transformations. These include models for sequential, distributed, parallel or mobile computation. A grap...
Mohamed Mosbah, Annegret Habel
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ISSTA
2009
ACM
15 years 11 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
APSEC
2007
IEEE
15 years 11 months ago
Towards Instant Automatic Model Refinement Based on OCL
Model refinement is a complex task. It is difficult for developers to refine models all by themselves. A good modeling tool should not only do routine refinement work for develope...
Hui Song, Yanchun Sun, Li Zhou, Gang Huang