Sciweavers

AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 3 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
AICCSA
2008
IEEE
290views Hardware» more  AICCSA 2008»
14 years 3 months ago
Test of preemptive real-time systems
Time Petri nets with stopwatches not only model system/environment interactions and time constraints. They further enable modeling of suspend/resume operations in real-time system...
Noureddine Adjir, Pierre de Saqui-Sannes, Kamel Mu...
AICCSA
2008
IEEE
267views Hardware» more  AICCSA 2008»
14 years 3 months ago
Comprehensive support for management of enterprise applications
During the last decades, performance of available hardware resources constantly increased [15], which enabled the assignment of more and more complex tasks to software systems. As...
Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido...
AICCSA
2008
IEEE
245views Hardware» more  AICCSA 2008»
14 years 3 months ago
Rapid and robust ranking of text documents in a dynamically changing corpus
Ranking documents in a selected corpus plays an important role in information retrieval systems. Despite notable advances in this direction, with continuously accumulating text do...
Byung-Hoon Park, Nagiza F. Samatova, Rajesh Munava...
AICCSA
2008
IEEE
261views Hardware» more  AICCSA 2008»
14 years 3 months ago
Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation
The aim of this paper is to describe a Quality of Service (QoS) model enabling to measure the perceptual quality of video transmissions by exploiting metrics from different layers...
Christian Timmerer, Víctor H. Ortega, Jose ...
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
14 years 3 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
ACSD
2008
IEEE
130views Hardware» more  ACSD 2008»
14 years 3 months ago
BAM: BioAmbient machine
In recent years it has become clear that techniques developed for concurrent programming are in fact very useful for the analysis of complex systems in biology. To some level of i...
Vinod A. Muganthan, Andrew Phillips, Maria Grazia ...
ACSD
2008
IEEE
114views Hardware» more  ACSD 2008»
14 years 3 months ago
Modeling and verifying asynchronous communication mechanisms using coloured Petri nets
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, two automati...
Kyller Costa Gorgônio, Fei Xia
ACSD
2008
IEEE
102views Hardware» more  ACSD 2008»
14 years 3 months ago
Performing causality analysis by bounded model checking
Synchronous systems can immediately react to the inputs of their environment which may lead to so-called causality cycles between actions and their trigger conditions. Systems wit...
Klaus Schneider, Jens Brandt
ACSD
2008
IEEE
127views Hardware» more  ACSD 2008»
14 years 3 months ago
On the interplay between fault handling and request-response service invocations
Abstract. Service Oriented Computing (SOC) allows for the composition of services which communicate using unidirectional notification or bidirectional request-response primitives....
Claudio Guidi, Ivan Lanese, Fabrizio Montesi, Gian...