Sciweavers

39 search results - page 3 / 8
» Formal Analysis of Key Integrity in PKCS
Sort
View
ASWEC
2006
IEEE
13 years 11 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
SAFECOMP
2007
Springer
13 years 11 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
FORMATS
2007
Springer
13 years 9 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
SIGSOFT
2000
ACM
13 years 9 months ago
COM revisited: tool-assisted modelling of an architectural framework
Designing architectural frameworks without the aid of formal modeling is error prone. But, unless supported by analysis, formal modeling is prone to its own class of errors, in wh...
Daniel Jackson, Kevin J. Sullivan
ER
2000
Springer
112views Database» more  ER 2000»
13 years 8 months ago
Ontological Analysis of Taxonomic Relationships
Taxonomies are an important part of conceptual modeling. They provide substantial structural information, and are typically the key elements in integration eorts, however there ha...
Nicola Guarino, Christopher A. Welty