Sciweavers

252 search results - page 17 / 51
» A Scenario-Based Approach to Protocol Design Using Evolution...
Sort
View
CCR
2004
151views more  CCR 2004»
14 years 11 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 23 days ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
ACMIDC
2009
15 years 3 months ago
Drama prototyping for the design of urban interactive systems for children
In this paper, we present Wi-swing, a case study approach in designing a networked playground for children located in a public garden. The approach adopted in the case study is ba...
Andrea Alessandrini, Antonio Rizzo, Elisa Rubegni
IJSEKE
2007
52views more  IJSEKE 2007»
14 years 11 months ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman
DSD
2011
IEEE
194views Hardware» more  DSD 2011»
13 years 11 months ago
Reliability-Aware Design Optimization for Multiprocessor Embedded Systems
—This paper presents an approach for the reliability-aware design optimization of real-time systems on multi-processor platforms. The optimization is based on an extension of wel...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...