Sciweavers

2584 search results - page 29 / 517
» On the Forward Checking Algorithm
Sort
View
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 1 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
TWC
2010
13 years 2 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
CAV
1999
Springer
125views Hardware» more  CAV 1999»
14 years 4 days ago
Model Checking of Safety Properties
Of special interest in formal verification are safety properties, which assert that the system always stays within some allowed region. A computation that violates a general linea...
Orna Kupferman, Moshe Y. Vardi
ACMICEC
2007
ACM
127views ECommerce» more  ACMICEC 2007»
13 years 12 months ago
Symbolic model checking of institutions
Norms defined by institutions and enforced by organizations have been put forward as a mechanism to increase the efficiency and reliability of electronic transactions carried out ...
Francesco Viganò, Marco Colombetti
MOBIS
2008
13 years 9 months ago
Business Process Compliance Checking: Current State and Future Challenges
Abstract: Regulatory compliance sets new requirements for business process management (BPM). Companies seek to enhance their corporate governance processes and are required to put ...
Marwane El Kharbili, Ana Karla A. de Medeiros, Seb...