Sciweavers

399 search results - page 42 / 80
» Verification of System Level Model Transformations
Sort
View
JUCS
2010
162views more  JUCS 2010»
14 years 9 months ago
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture
Abstract: Model-Driven Architecture (MDA) presents a set of layered models to separate design concerns from platform concerns. The model executability for each model element is sti...
Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Le...
COMPSEC
2010
142views more  COMPSEC 2010»
14 years 11 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
128
Voted
ESORICS
2008
Springer
15 years 4 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
174
Voted
ECMDAFA
2006
Springer
228views Hardware» more  ECMDAFA 2006»
15 years 6 months ago
Model Driven Development of Multi-Agent Systems
Abstract. Design patterns are templates of general solutions to commonlyoccurring problems in the analysis and design of software systems. In mature development processes, engineer...
Juan Pavón, Jorge J. Gómez-Sanz, Rub...
124
Voted
DATE
2009
IEEE
151views Hardware» more  DATE 2009»
15 years 9 months ago
Combined system synthesis and communication architecture exploration for MPSoCs
In this paper, a novel design space exploration approach is proposed that enables a concurrent optimization of the topology, the process binding, and the communication routing of ...
Martin Lukasiewycz, Martin Streubühr, Michael...