Sciweavers

3147 search results - page 578 / 630
» Open-Source Model Checking
Sort
View
CCR
2004
87views more  CCR 2004»
13 years 7 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig
CAGD
2002
97views more  CAGD 2002»
13 years 7 months ago
Hierarchical multiresolution reconstruction of shell surfaces
We present an adaptive, hierarchical Hh-multiresolution reconstruction algorithm to model shell surface objects from a matched pair of triangulated surfaces. Shell surfaces are an...
Chandrajit L. Bajaj, Guoliang Xu, Robert J. Holt, ...
ENTCS
2002
145views more  ENTCS 2002»
13 years 7 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
SAJ
2000
129views more  SAJ 2000»
13 years 7 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha
ASE
1999
126views more  ASE 1999»
13 years 7 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...