Sciweavers

1264 search results - page 151 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
LISA
2003
15 years 5 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
MOBISYS
2008
ACM
15 years 6 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
SIGSOFT
2007
ACM
16 years 4 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
TCOS
2010
14 years 11 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
148
Voted
FTCS
1997
115views more  FTCS 1997»
15 years 5 months ago
Robust Emulation of Shared Memory Using Dynamic Quorum-Acknowledged Broadcasts
This paper presents robust emulation of multi-writer/multi-reader registers in message-passing systems using dynamic quorum con gurations. In addition to processor and link failur...
Nancy A. Lynch, Alexander A. Shvartsman