Sciweavers

426 search results - page 36 / 86
» Towards Verifying Model Transformations
Sort
View
JSS
2006
153views more  JSS 2006»
13 years 9 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
IJFCS
2006
119views more  IJFCS 2006»
13 years 10 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
SACMAT
2009
ACM
14 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
IJBRA
2007
84views more  IJBRA 2007»
13 years 9 months ago
Is the protein folding an aim-oriented process? Human haemoglobin as example
: The model for protein folding (in silico) simulation is presented. Three steps have been implemented: • early stage folding based on the backbone conformation • hydrophobic c...
Michal Brylinski, Leszek Konieczny, Irena Roterman
ICECCS
2010
IEEE
161views Hardware» more  ICECCS 2010»
13 years 10 months ago
Model Checking Round-Based Distributed Algorithms
—In the field of distributed computing, there are many round-based algorithms to solve fundamental problems, such as leader election and distributed consensus. Due to the nature...
Xin An, Jun Pang