Sciweavers

122 search results - page 24 / 25
» Modeling and analyzing security protocols in SAM: A case stu...
Sort
View
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
14 years 3 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
SACMAT
2009
ACM
14 years 1 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
ANSOFT
2002
94views more  ANSOFT 2002»
13 years 6 months ago
Testing Processes of Web Applications
Abstract. Current practice in Web application development is based on the skills of the individual programmers and often does not apply the principles of software engineering. The ...
Filippo Ricca, Paolo Tonella
IBMRD
2011
112views more  IBMRD 2011»
13 years 1 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
HYBRID
1998
Springer
13 years 11 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch