Sciweavers

528 search results - page 61 / 106
» Construction of concrete verification models from C
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Non-saturation and saturation analysis of IEEE 802.11e EDCA with starvation prediction
An analytical model is proposed to describe the priority schemes of the EDCA mechanism of the IEEE 802.11e standard. EDCA provides class-based differentiated QoS to IEEE 802.11 WL...
Paal Engelstad, Olav N. Østerbø
ICSE
2008
IEEE-ACM
14 years 9 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 6 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
AAAI
1994
13 years 10 months ago
Associative Memory in an Immune-Based System
The immune system offers to be a rich source of metaphors to guide the exploration of the notion of an adaptive system. We might define a class of systems which are inspired by, b...
C. J. Gibert, Tom Routen
ENTCS
2006
176views more  ENTCS 2006»
13 years 8 months ago
Gauss: A Framework for Verifying Scientific Computing Software
High performance scientific computing software is of critical international importance as it supports scientific explorations and engineering. Software development in this area is...
Robert Palmer, Steve Barrus, Yu Yang, Ganesh Gopal...