Sciweavers

4636 search results - page 96 / 928
» Modelling and Validation with VipTool
Sort
View
FDL
2007
IEEE
13 years 11 months ago
A Metamodeling based Framework for Architectural Modeling and Simulator Generation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. The informal specification document from which the various collaterals are ...
Deepak Mathaikutty, Ajit Dingankar, Sandeep K. Shu...
WASA
2009
Springer
165views Algorithms» more  WASA 2009»
14 years 2 months ago
Maximum Independent Set of Links under Physical Interference Model
This paper addresses the following optimization problem in a plane multihop wireless networks under the physical interference model: From a given a set of communication links whose...
Peng-Jun Wan, Xiaohua Jia, F. Frances Yao
ICIS
2004
13 years 9 months ago
A Factor and Structural Equation Analysis of the Enterprise Systems Success Measurement Model
Enterprise systems entail complex organizational interventions. Accurately gauging the impact of any complex information system requires understanding its multidimensionality, and...
Darshana Sedera, Guy G. Gable
IADIS
2004
13 years 9 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
SADFE
2008
IEEE
14 years 2 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...