Sciweavers

2838 search results - page 466 / 568
» Verifying Controlled Components
Sort
View
POLICY
2009
Springer
14 years 4 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
14 years 4 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
ISSTA
2009
ACM
14 years 4 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
14 years 4 months ago
Retargetable Code Optimization for Predicated Execution
Retargetable C compilers are key components of today’s embedded processor design platforms for quickly obtaining compiler support and performing early processor architecture exp...
Manuel Hohenauer, Felix Engel, Rainer Leupers, Ger...
GLOBECOM
2008
IEEE
14 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri