Sciweavers

1446 search results - page 116 / 290
» Formal analysis of hardware requirements
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 10 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
IADIS
2004
13 years 11 months ago
Telecollaboration - a case study for performance analysis of voip systems
The evolving nature of complex traffic issues of IP (Internet Protocol)-based Telecollaboration (TC) business system technology requires an intuitive understanding for the partici...
Venkatesh Mahadevan, Zenon Chaczko
NETWORKING
2000
13 years 11 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
GLOBECOM
2008
IEEE
13 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
BCB
2010
138views Bioinformatics» more  BCB 2010»
13 years 5 months ago
Comparative analysis of biclustering algorithms
Biclustering is a very popular method to identify hidden co-regulation patterns among genes. There are numerous biclustering algorithms designed to undertake this challenging task...
Doruk Bozdag, Ashwin S. Kumar, Ümit V. &Ccedi...