Sciweavers

438 search results - page 48 / 88
» Defending Critical Infrastructure
Sort
View
DEBS
2003
ACM
14 years 2 months ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
NDSS
2000
IEEE
14 years 1 months ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...
CAV
1998
Springer
103views Hardware» more  CAV 1998»
14 years 1 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
ESCIENCE
2007
IEEE
13 years 10 months ago
The Ring Buffer Network Bus (RBNB) DataTurbine Streaming Data Middleware for Environmental Observing Systems
— The environmental science and engineering communities are actively engaged in planning and developing the next generation of large-scale sensor-based observing systems. These s...
Sameer Tilak, Paul Hubbard, Matt Miller, Tony Foun...
FMICS
2010
Springer
13 years 10 months ago
SMT-Based Formal Verification of a TTEthernet Synchronization Function
Abstract. TTEthernet is a communication infrastructure for mixedcriticality systems that integrates dataflow from applications with different criticality levels on a single network...
Wilfried Steiner, Bruno Dutertre