Sciweavers

458 search results - page 71 / 92
» Designing and executing protocols using the event calculus
Sort
View
VTC
2010
IEEE
164views Communications» more  VTC 2010»
13 years 6 months ago
Metrics for Performance Prediction of Wireless Sensor Networks
—We present the derivation of a novel metric for the performance prediction of Wireless Sensor Networks (WSNs). In particular, the metric can be applied in, for example, monitori...
Frank Oldewurtel, Petri Mähönen
WSC
2001
13 years 9 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CODES
2008
IEEE
13 years 9 months ago
Performance debugging of Esterel specifications
Synchronous languages like Esterel have been widely adopted for designing reactive systems in safety-critical domains such as avionics. Specifications written in Esterel are based...
Lei Ju, Bach Khoa Huynh, Abhik Roychoudhury, Samar...
EMSOFT
2011
Springer
12 years 7 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...