Sciweavers

297 search results - page 45 / 60
» Model Checking Guarded Protocols
Sort
View
JCP
2006
116views more  JCP 2006»
13 years 9 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
FASE
2009
Springer
14 years 1 months ago
Enhanced Property Specification and Verification in BLAST
Model checking tools based on the iterative refinement of predicate abstraction (e.g., Slam and Blast) often feature a specification language for expressing complex behavior rules....
Ondrej Sery
ICN
2007
Springer
14 years 4 months ago
ABW - Short-Timescale Passive Bandwidth Monitoring
ct Bandwidth usage monitoring is important for network troubleshooting and planning. Traditionally, used bandwidth is computed from router interface byte counters read by SNMP. Thi...
Sven Ubik, Demetres Antoniades, Arne Øsleb&...
JAVA
2001
Springer
14 years 2 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
IJSNET
2007
101views more  IJSNET 2007»
13 years 9 months ago
Some problems of directional sensor networks
Abstract: Wireless sensor networks are often based on omni-sensing and communication models. In contrast, in this paper, we investigate sensor networks with directional sensing and...
Huadong Ma, Yonghe Liu