Sciweavers

3053 search results - page 96 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
TCS
2008
13 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
CPE
1994
Springer
170views Hardware» more  CPE 1994»
14 years 1 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
WOTUG
2008
13 years 10 months ago
Representation and Implementation of CSP and VCR Traces
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
Neil C. C. Brown, Marc L. Smith
FMICS
2006
Springer
14 years 21 days ago
Model-Based Testing of a WAP Gateway: An Industrial Case-Study
Abstract. We present experiences from a case study where a model-based approach to black-box testing is applied to verify that a Wireless Application Protocol (WAP) gateway conform...
Anders Hessel, Paul Pettersson
GCC
2007
Springer
13 years 10 months ago
Component Based Legacy Program Executing over Grid
Executing the legacy program over grid is very important and necessary. To reuse the legacy program, we developed a method based on Component for executing the legacy code. We can...
Le Du, Yongwei Wu, Chunlu Wang