Sciweavers

3828 search results - page 712 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
TON
2008
103views more  TON 2008»
13 years 9 months ago
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
We consider the vector fixed point equations arising out of the analysis of the saturation throughput of a single cell IEEE 802.11e (EDCA) wireless local area network with nodes th...
Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman
EUROSYS
2008
ACM
14 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
ISSA
2004
13 years 10 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
WSC
2000
13 years 10 months ago
Confident decision making and improved throughput for cereal manufacturing with simulation
In 1999, Kellogg Company needed to rationalize its area manufacturing capacity. A significant portion of the production was moved between Kellogg manufacturing plants. Simulation ...
Travis A. Dahl, Brian F. Jacob
FMCAD
2006
Springer
14 years 21 days ago
An Integration of HOL and ACL2
We describe a link between the ACL2 and HOL mechanical proof assistants that enables the strengths of each system to be deployed smoothly within a single formal development. Severa...
Michael J. C. Gordon, James Reynolds, Warren A. Hu...