Sciweavers

2661 search results - page 116 / 533
» Model Checking Performability Properties
Sort
View
122
Voted
ADHOCNOW
2008
Springer
15 years 9 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
126
Voted
CSFW
2004
IEEE
15 years 6 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
164
Voted
ICDT
2009
ACM
121views Database» more  ICDT 2009»
15 years 9 days ago
Automatic verification of database-driven systems: a new frontier
We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantee...
Victor Vianu
127
Voted
AOSE
2005
Springer
15 years 8 months ago
Formalisation and Analysis of the Temporal Dynamics of Conditioning
In order to create adaptive Agent Systems with abilities matching those of their biological counterparts, a natural approach is to incorporate classical conditioning mechanisms int...
Tibor Bosse, Catholijn M. Jonker, Sander A. Los, L...
121
Voted
ICTAC
2005
Springer
15 years 8 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel