Sciweavers

2663 search results - page 204 / 533
» How to Choose a Timing Model
Sort
View
ESORICS
2002
Springer
16 years 4 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe
CIG
2006
IEEE
15 years 10 months ago
Modeling Children's Entertainment in the Playware Playground
Abstract— This paper introduces quantitative measurements/metrics of qualitative entertainment features within interactive playgrounds inspired by computer games and proposes art...
Georgios N. Yannakakis, Henrik Hautop Lund, John H...
BERTINORO
2005
Springer
15 years 10 months ago
On the Use of Online Analytic Performance Models, in Self-Managing and Self-Organizing Computer Systems
Current computing environments are becoming increasingly complex in nature and exhibit unpredictable workloads. These environments create challenges to the design of systems that c...
Daniel A. Menascé, Mohamed N. Bennani, Hong...
DATE
2010
IEEE
168views Hardware» more  DATE 2010»
15 years 9 months ago
Verifying UML/OCL models using Boolean satisfiability
Abstract--Nowadays, modeling languages like UML are essential in the design of complex software systems and also start to enter the domain of hardware and hardware/software codesig...
Mathias Soeken, Robert Wille, Mirco Kuhlmann, Mart...
140
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn