Sciweavers

401 search results - page 59 / 81
» Formal Analysis of Meeting Protocols
Sort
View
FECS
2006
80views Education» more  FECS 2006»
14 years 1 days ago
A Redesigned Undergraduate Data Communication and Networking Course Incorporating Theory and Practice
Data Communication and Computer Networking is a traditional undergraduate CS course. Classic teaching focuses on communication protocol and algorithm analysis, plus socket programm...
Ziping Liu
EUPROJECTS
2005
Springer
14 years 4 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann
ECEASST
2008
75views more  ECEASST 2008»
13 years 10 months ago
Extended OCL for Goal Monitoring
Monitoring human-computer interaction aids the analysis for understanding how well software meets its purpose. In particular, monitoring human-computer interactions with respect to...
William N. Robinson
ESORICS
2009
Springer
14 years 11 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
IPSN
2005
Springer
14 years 4 months ago
Maximizing system lifetime in wireless sensor networks
Maximizing system lifetime in battery-powered wireless sensor networks with power aware topology control protocols and routing protocols has received intensive research. In the pa...
Qunfeng Dong