Sciweavers

1268 search results - page 48 / 254
» Verifying distributed systems: the operational approach
Sort
View
CSFW
2009
IEEE
14 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ICC
2008
IEEE
119views Communications» more  ICC 2008»
14 years 4 months ago
Wavelet-Based SNR Analysis in Building Satellite Terminal Fault Identification System
—With the rapid expansion of satellite communication, an increasing number of unattended ground terminals are spreading out to serve local customers. And there is a great demand ...
Liang Xu, Changcheng Huang
CAV
2005
Springer
133views Hardware» more  CAV 2005»
14 years 3 months ago
On Statistical Model Checking of Stochastic Systems
Statistical methods to model check stochastic systems have been, thus far, developed only for a sublogic of continuous stochastic logic (CSL) that does not have steady state operat...
Koushik Sen, Mahesh Viswanathan, Gul Agha
ISSE
2008
13 years 10 months ago
Automatic framework generation for hard real-time applications
The communication and tasking infrastructure of a real-time application makes up a significant portion of any modern embedded control system. Traditionally, the tasking and communi...
Irfan Hamid, Bechir Zalila, Elie Najm, Jér&...
TPHOL
2009
IEEE
14 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...