Sciweavers

465 search results - page 37 / 93
» Software copyright and role models
Sort
View
SIGSOFT
2007
ACM
14 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
TCS
2011
13 years 4 months ago
Parameter estimation for Boolean models of biological networks
Boolean networks have long been used as models of molecular networks and play an increasingly important role in systems biology. This paper describes a software package, offered ...
Elena S. Dimitrova, Luis David García-Puent...
CASSIS
2004
Springer
14 years 3 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
FSTTCS
2001
Springer
14 years 2 months ago
Distributed LTL Model Checking Based on Negative Cycle Detection
Abstract. This paper addresses the state explosion problem in automata based LTL model checking. To deal with large space requirements we turn to use a distributed approach. All th...
Lubos Brim, Ivana Cerná, Pavel Krcál...
DEXAW
1995
IEEE
93views Database» more  DEXAW 1995»
14 years 1 months ago
Meta Modeling for End User Computing
Inherent constraints play an important role in the semantic Xplain model. These constraints enable us to represent certain real world knowledge once for subsequent use in several ...
J. H. ter Bekke