Sciweavers

128 search results - page 7 / 26
» When the a contrario approach becomes generative
Sort
View
PRDC
2007
IEEE
14 years 1 months ago
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time
Model-based development has become state of the art in software engineering. Unfortunately, the used code generators often focus on the pure application functionality. Features li...
Christian Buckl, Matthias Regensburger, Alois Knol...
RV
2010
Springer
153views Hardware» more  RV 2010»
13 years 5 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
14 years 8 days ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
CORR
2010
Springer
181views Education» more  CORR 2010»
13 years 7 months ago
Data Hiding Techniques Using Prime and Natural Numbers
In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding te...
Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, ...
CBSE
2011
Springer
12 years 7 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...