Sciweavers

253 search results - page 28 / 51
» How to Transform an Analyzer into a Verifier
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
SAC
2003
ACM
14 years 24 days ago
Eliciting Coordination Policies from Requirements
Software coordination models and languages describe how agents, resources and processes work together to implement a software system. One of their limitations is that they are use...
Henry Muccini, Fabio Mancinelli
IM
2007
13 years 9 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
CORR
2007
Springer
111views Education» more  CORR 2007»
13 years 7 months ago
A New Perspective on Multi-user Power Control Games in Interference Channels
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
Yi Su, Mihaela van der Schaar
SEMWEB
2009
Springer
14 years 2 months ago
Semantically-Aided Business Process Modeling
Enriching business process models with semantic annotations taken from an ontology has become a crucial necessity both in service provisioning, integration and composition, and in ...
Chiara Di Francescomarino, Chiara Ghidini, Marco R...