Sciweavers

1415 search results - page 234 / 283
» Verified systems by composition from verified components
Sort
View
IEEECIT
2005
IEEE
14 years 1 months ago
A Performance and Power Co-optimization Approach for Modern Processors
In embedded systems, performance and power are important inter-related issues that cannot be decoupled. Expensive and extensive simulations in a processor design space are usually...
Yongxin Zhu, Weng-Fai Wong, Cheng-Kok Koh
NDSS
2005
IEEE
14 years 1 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ATAL
2005
Springer
14 years 1 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
BPM
2005
Springer
85views Business» more  BPM 2005»
14 years 1 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
14 years 1 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...