Sciweavers

1268 search results - page 63 / 254
» Verifying distributed systems: the operational approach
Sort
View
ICALP
2001
Springer
14 years 3 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
ICDCS
2005
IEEE
14 years 4 months ago
Comparison of Approaches to Service Deployment
IT today is driven by the trend of increasing scale and complexity. Utility and Grid computing models, PlanetLab, and traditional data centers, are reaching the scale of thousands...
Vanish Talwar, Qinyi Wu, Calton Pu, Wenchang Yan, ...
CASES
2003
ACM
14 years 2 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
HPCA
2002
IEEE
14 years 11 months ago
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach
Power dissipation has become one of the most critical factors for the continued development of both high-end and low-end computer systems. The successful design and evaluation of ...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary J...
EDOC
2007
IEEE
14 years 5 months ago
Structuring Software Cities A Multidimensional Approach
IT application landscapes alias software cities of large enterprises comprise tens or even hundreds of IT applications. Structuring software cities into domains is an important tas...
Andreas Hess, Bernhard Humm, Markus Voß, Gre...