Sciweavers

1056 search results - page 138 / 212
» Mapping an Application to a Control Architecture: Specificat...
Sort
View
NETGAMES
2006
ACM
14 years 1 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura
HASE
2007
IEEE
14 years 2 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 9 months ago
Reachability analysis for a class of Petri nets
In this paper, we study the reachability problem for the class of (strictly) monotone Petri nets that we define based on algebraic conditions. More specifically, given a (strictly)...
Yu Ru, Christoforos N. Hadjicostis
CLUSTER
2001
IEEE
13 years 11 months ago
Clusterfile: A Flexible Physical Layout Parallel File System
This paper presents Clusterfile, a parallel file system that provides parallel file access on a cluster of computers. Existing parallel file systems offer little control over matc...
Florin Isaila, Walter F. Tichy