Sciweavers

531 search results - page 82 / 107
» Formal Methods for Networks on Chips
Sort
View
CCS
2005
ACM
14 years 1 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
14 years 1 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná
MTA
2010
118views more  MTA 2010»
13 years 6 months ago
A computation-oriented multimedia data streams model for content-based information retrieval
: Multimedia applications nowadays are becoming prevalent. In the past the relational database model was generalized to the multimedia database model. More recently the relational ...
Shi-Kuo Chang, Lei Zhao, Shenoda Guirguis, Rohit K...
AINA
2009
IEEE
14 years 2 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
ISORC
2008
IEEE
14 years 1 months ago
Cyber Physical Systems: Design Challenges
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedb...
Edward A. Lee