Sciweavers

125 search results - page 10 / 25
» Describing Cryptobiosis as a Time Based Protection System Us...
Sort
View
IJCSA
2006
77views more  IJCSA 2006»
13 years 7 months ago
Formal Approach for the Coherence Control of SMIL Documents
This paper presents a formal approach based on Time Petri net (TPN) for the coherence control of SMIL documents. TPN model has been widely used to specify real time systems. The q...
S. Mazouz, D. Dahmani, L. Kaddouri
DATE
2006
IEEE
117views Hardware» more  DATE 2006»
14 years 1 months ago
Formal verification of systemc designs using a petri-net based representation
This paper presents an effective approach to formally verify SystemC designs. The approach translates SystemC models into a Petri-Net based representation. The Petri-net model is ...
Daniel Karlsson, Petru Eles, Zebo Peng
WORDS
2005
IEEE
14 years 29 days ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
ENTCS
2006
180views more  ENTCS 2006»
13 years 7 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
ACMSE
2005
ACM
14 years 28 days ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke