Sciweavers

1126 search results - page 65 / 226
» Modularity and the Rule of Adaptation
Sort
View
126
Voted
DSRT
2008
IEEE
15 years 10 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
125
Voted
EUROMICRO
2007
IEEE
15 years 10 months ago
SensBution: A Rule-Based Peer-to-Peer Approach for Sensor-Based Infrastructures
Ubiquitous environments facilitate the fast and easy access to users’ physical environments. Ubiquitous environments typically capture users’ presence and activities in a room...
Tom Gross, Thilo Paul-Stueve, Tsvetomira Palakarsk...
137
Voted
CHARME
2003
Springer
196views Hardware» more  CHARME 2003»
15 years 9 months ago
Analyzing the Intel Itanium Memory Ordering Rules Using Logic Programming and SAT
We present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constra...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom, K...
157
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
150
Voted
FUIN
2006
128views more  FUIN 2006»
15 years 3 months ago
A Rewriting Framework for Rule-Based Programming Dynamic Applications
In recent years light-weighted formal methods are of growing interest in construction and analysis of complex concurrent software system. A new rule-action based term rewriting fr...
Anatoly E. Doroshenko, Ruslan Shevchenko