Sciweavers

10263 search results - page 71 / 2053
» From Use Cases to System Operation Specifications
Sort
View
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
SRDS
2003
IEEE
14 years 2 months ago
Component Replication in Distributed Systems: A Case Study Using Enterprise Java Beans
A recent trend has seen the extension of objectoriented middleware to component-oriented middleware. A major advantage components offer over objects is that only the business logi...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
WSC
2004
13 years 10 months ago
A Case Study in Meta-Simulation Design and Performance Analysis for Large-Scale Networks
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...
JSS
2008
122views more  JSS 2008»
13 years 7 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
ESAW
2000
Springer
14 years 14 days ago
Formal Specification and Prototyping of Multi-agent Systems
Abstract. This paper presents a multi agent-oriented prototyping approach. It is a generic approach, applicable to a wide range of multi-agent systems. This approach relies on a fe...
Vincent Hilaire, Abder Koukam, Pablo Gruer, Jean-P...