Sciweavers

222 search results - page 11 / 45
» Development of Correct Graph Transformation Systems
Sort
View
POLICY
2001
Springer
13 years 12 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
BTW
2001
Springer
103views Database» more  BTW 2001»
13 years 12 months ago
On Realizing Transformation Independence in Open, Distributed Multimedia Information Systems
In this article, we present our efforts1 on realizing transformation independence in open, extensible, and highly distributed multimedia information The main focus is on the abstra...
Ulrich Marder
SAC
2003
ACM
14 years 22 days ago
Validation of Code-Improving Transformations for Embedded Systems
Programmers of embedded systems often develop software in assembly code due to inadequate support from compilers and the need to meet critical speed and/or space constraints. Many...
Robert van Engelen, David B. Whalley, Xin Yuan
ENTCS
2008
88views more  ENTCS 2008»
13 years 7 months ago
Behavior-Preserving Simulation-to-Animation Model and Rule Transformations
In the framework of graph transformation, simulation rules define the operational behavior of visual models. Moreover, it has been shown already how to construct animation rules f...
Claudia Ermel, Hartmut Ehrig
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 23 days ago
Identifying Transformer Incipient Events for Maintaining Distribution System Reliability
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Karen L. Butler-Purry, Mustafa Bagriyanik