Sciweavers

691 search results - page 55 / 139
» Modeling the Case Study with LDL and Implementing it with LD...
Sort
View
TACAS
2010
Springer
212views Algorithms» more  TACAS 2010»
13 years 6 months ago
Assume-Guarantee Verification for Probabilistic Systems
Abstract. We present a compositional verification technique for systems that exhibit both probabilistic and nondeterministic behaviour. We adopt an assume-guarantee approach to ver...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
WOA
2010
13 years 6 months ago
Programming Wireless Body Sensor Network Applications through Agents
Wireless Sensor Networks (WSNs) are currently emerging as one of the most disruptive technologies enabling and supporting next generation ubiquitous and pervasive computing scenari...
Giancarlo Fortino, Stefano Galzarano
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
TCAD
2011
13 years 2 months ago
High-Level Synthesis for FPGAs: From Prototyping to Deployment
—Escalating system-on-chip design complexity is the design community to raise the level of abstraction beyond register transfer level. Despite the unsuccessful adoptions of early...
Jason Cong, Bin Liu, Stephen Neuendorffer, Juanjo ...