Sciweavers

2034 search results - page 376 / 407
» Declarative Agent Control
Sort
View
CSFW
2007
IEEE
14 years 1 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
GLOBECOM
2007
IEEE
14 years 1 months ago
Service Oriented Architecture (SOA) for Integration of Field Bus Systems
—The current trends in service consolidation over Internet Protocol (IP) also stimulates the integration of the industrial automation system with the information technology (IT) ...
Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian
IJCNN
2007
IEEE
14 years 1 months ago
Enhanced Facilitatory Neuronal Dynamics for Delay Compensation
— Our earlier work has suggested that neuronal transmission delay may cause serious problems unless a compensation mechanism exists. In that work, facilitating neuronal dynamics ...
Jaerock Kwon, Yoonsuck Choe
INFOCOM
2007
IEEE
14 years 1 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
14 years 1 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing