Sciweavers

2419 search results - page 173 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 1 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
DSN
2005
IEEE
14 years 2 months ago
Lumping Matrix Diagram Representations of Markov Models
Continuous-time Markov chains (CTMCs) have been used successfully to model the dependability and performability of many systems. Matrix diagrams (MDs) are known to be a space-efï¬...
Salem Derisavi, Peter Kemper, William H. Sanders
ICCS
2003
Springer
14 years 2 months ago
Export Behaviour Modeling Using EvoNF Approach
The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, cus...
Ron Edwards, Ajith Abraham, Sonja Petrovic-Lazarev...
DSN
2005
IEEE
13 years 11 months ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
IPPS
2006
IEEE
14 years 3 months ago
FIFO scheduling of divisible loads with return messages under the one-port model
This paper deals with scheduling divisible load applications on star networks, in presence of return messages. This work is a follow-on of [6, 7], where the same problem was consi...
Olivier Beaumont, Loris Marchal, Veronika Rehn, Yv...