Sciweavers

323 search results - page 39 / 65
» Verifying the Mondex Case Study
Sort
View
FM
2009
Springer
163views Formal Methods» more  FM 2009»
14 years 2 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
14 years 1 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
OSDI
2008
ACM
14 years 10 months ago
Run-time Energy Consumption Estimation Based on Workload in Server Systems
This paper proposes to develop a system-wide energy consumption model for servers by making use of hardware performance counters and experimental measurements. We develop a real-t...
Adam Lewis, Soumik Ghosh, Nian-Feng Tzeng
PLPV
2010
ACM
14 years 6 months ago
Free theorems for functional logic programs
Type-based reasoning is popular in functional programming. In particular, parametric polymorphism constrains functions in such a way that statements about their behavior can be de...
Jan Christiansen, Daniel Seidel, Janis Voigtlä...
ICARCV
2008
IEEE
151views Robotics» more  ICARCV 2008»
14 years 4 months ago
Model-Based Networked Control System stability based on packet drop distributions
Abstract—This paper studies the system stability of a ModelBased Networked Control System in the cases where packet losses follow a certain distributions. In this study, the unre...
Lanzhi Teng, Peng Wen, Wei Xiang