Sciweavers

1898 search results - page 239 / 380
» Weak Keys for IDEA
Sort
View
154
Voted
EMSOFT
2009
Springer
15 years 10 months ago
Analytic real-time analysis and timed automata: a hybrid method for analyzing embedded real-time systems
This paper advocates a strict compositional and hybrid approach for obtaining key (performance) metrics of embedded At its core the developed methodology abstracts system componen...
Kai Lampka, Simon Perathoner, Lothar Thiele
135
Voted
FGIT
2009
Springer
15 years 10 months ago
AGILE Rate Control for IEEE 802.11 Networks
We present a transmission rate adaptation algorithm called AGILE (ACK-Guided Immediate Link rate Estimation) for IEEE 802.11 networks. The key idea of AGILE is that the transmitter...
Lochan Verma, Seongkwan Kim, Sunghyun Choi, Sung-J...
158
Voted
FM
2009
Springer
110views Formal Methods» more  FM 2009»
15 years 10 months ago
Reduced Execution Semantics of MPI: From Theory to Practice
Abstract: There is growing need to develop formal verification tools for Message Passing Interface (MPI) programs, to eliminate bugs such as deadlocks and local assertion violatio...
Sarvani S. Vakkalanka, Anh Vo, Ganesh Gopalakrishn...
136
Voted
FSEN
2009
Springer
15 years 10 months ago
Program Logics for Sequential Higher-Order Control
We introduce a Hoare logic for higher-order functional languages with control operators such as callcc. The key idea is to build the assertion language and proof rules around an e...
Martin Berger
113
Voted
FSTTCS
2009
Springer
15 years 10 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...