Sciweavers

1653 search results - page 272 / 331
» Timed analysis of security protocols
Sort
View
RAS
2007
169views more  RAS 2007»
13 years 8 months ago
Decentralized cooperative control of heterogeneous vehicle groups
We coordinate in discrete time the interaction of two heterogeneous groups of mobile agents: a group of ground vehicles (ugvs) and a group of aerial vehicles (uavs). The ground ag...
Herbert G. Tanner, D. K. Christodoulakis
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 3 months ago
opaal: A Lattice Model Checker
Abstract. We present a new open source model checker, opaal, for automatic verification of models using lattice automata. Lattice automata allow the users to incorporate abstracti...
Andreas Engelbredt Dalsgaard, René Rydhof H...
GLOBECOM
2007
IEEE
14 years 3 months ago
Improving Packet Delivery Performance of BGP During Large-Scale Failures
— The border gateway protocol (BGP) is known to take a long time to converge to a steady state following the failure of BGP routers or inter-router links. This has resulted in ex...
Amit Sahoo, Krishna Kant, Prasant Mohapatra
WIOPT
2006
IEEE
14 years 2 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi
RTCSA
2005
IEEE
14 years 2 months ago
Optimization of Hierarchically Scheduled Heterogeneous Embedded Systems
We present an approach to the analysis and optimization of heterogeneous distributed embedded systems for hard real-time applications. The systems are heterogeneous not only in te...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng