Sciweavers

461 search results - page 70 / 93
» Developing security protocols by refinement
Sort
View
CBSE
2008
Springer
13 years 10 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
13 years 8 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
INFOCOM
2006
IEEE
14 years 1 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
IPPS
1998
IEEE
14 years 4 days ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
14 years 1 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin