Sciweavers

533 search results - page 21 / 107
» Verification of Distributed Firewalls
Sort
View
DEBS
2007
ACM
14 years 1 months ago
Seamless formal verification of complex event processing applications
AnnMarie Ericsson, Paul Pettersson, Mikael Berndts...
IPPS
2007
IEEE
14 years 4 months ago
Multi-Core Model Checking with SPIN
—We present the first experimental results on the implementation of a multi-core model checking algorithm for the SPIN model checker. These algorithms specifically target shared-...
Gerard J. Holzmann, Dragan Bosnacki
BROADNETS
2007
IEEE
14 years 4 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
ECEASST
2008
106views more  ECEASST 2008»
13 years 10 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
IEEESP
2008
136views more  IEEESP 2008»
13 years 10 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...