Sciweavers

401 search results - page 42 / 81
» Formal Analysis of Meeting Protocols
Sort
View
RIDE
1999
IEEE
14 years 3 months ago
Modeling and Analysis of Interactions in Virtual Enterprises
Advances in computer networking technology and open system standards are making the creation and management of virtual enterprises feasible. A virtual enterprise is a temporary co...
Hasan Davulcu, Michael Kifer, L. Robert Pokorny, C...
PRDC
2008
IEEE
14 years 5 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
WORDS
2003
IEEE
14 years 4 months ago
Input-Dependency Analysis for Hard Real-Time Software
The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be com...
Jan Gustafsson, Björn Lisper, Raimund Kirner,...
IPPS
2008
IEEE
14 years 5 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
JOT
2010
96views more  JOT 2010»
13 years 9 months ago
UML Profiles for Modeling Real-Time Communication Protocols
Validation of non-functional and functional properties of these protocols during the early stages of design and development is important to reduce cost resulting from protocol ano...
Barath Kumar, Jürgen Jasperneite