Sciweavers

974 search results - page 142 / 195
» Formal Modeling of Communication Traces
Sort
View
CSFW
2005
IEEE
15 years 9 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
124
Voted
WICSA
2004
15 years 4 months ago
An Architectural Approach to Mobility - The Handover Case Study
COMMUNITY is a formal approach to software architecture. Its main characteristics are: a precise, yet intuitive mathematical semantics based on categorical diagrams; a clear separ...
Cristóvão Oliveira, Michel Wermeling...
128
Voted
ECEASST
2008
83views more  ECEASST 2008»
15 years 3 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg
108
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 3 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
133
Voted
ETT
2002
142views Education» more  ETT 2002»
15 years 3 months ago
Adaptive state- dependent importance sampling simulation of markovian queueing networks
In this paper, a method is presented for the efficient estimation of rare-event (buffer overflow) probabilities in queueing networks using importance sampling. Unlike previously pr...
Pieter-Tjerk de Boer, Victor F. Nicola