Sciweavers

1051 search results - page 135 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
MSWIM
2006
ACM
14 years 2 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ASWEC
2006
IEEE
14 years 3 months ago
A Runtime Monitoring and Validation Framework for Web Service Interactions
Web services are designed for composition and use by third parties through dynamic discovery. As such, the issue of interoperability between services is of great importance to ens...
Zheng Li, Yan Jin, Jun Han
ICSE
2003
IEEE-ACM
14 years 9 months ago
A Compositional Formalization of Connector Wrappers
Increasingly systems are composed of parts: software components, and the interaction mechanisms (connectors) that enable them to communicate. When assembling systems from independ...
Bridget Spitznagel, David Garlan
AC
2003
Springer
14 years 2 months ago
Application of Coloured Petri Nets in System Development
Coloured Petri Nets (CP-nets or CPNs) and their supporting computer tools have been used in a wide range of application areas such as communication protocols, software designs, and...
Lars Michael Kristensen, Jens Bæk Jør...