Sciweavers

401 search results - page 41 / 81
» Formal Analysis of Meeting Protocols
Sort
View
CNSM
2010
13 years 8 months ago
Gossip-based resource management for cloud environments
1 We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architectur...
Fetahi Wuhib, Rolf Stadler, Mike Spreitzer
ICSE
2008
IEEE-ACM
14 years 11 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ARESEC
2011
104views more  ARESEC 2011»
12 years 10 months ago
An Inductive Approach to Provable Anonymity
—We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and...
Yongjian Li, Jun Pang
HYBRID
1998
Springer
14 years 3 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
IFIP
2000
Springer
14 years 2 months ago
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations
: IEEE 802.11 is a wireless network standard that was completed in 1997. Unfortunately, the medium access protocol described in the standard meets some problems that arise from the...
Marek Natkaniec, Andrzej R. Pach