Sciweavers

1612 search results - page 244 / 323
» About models of security protocols
Sort
View
USENIX
2003
14 years 11 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
IDA
2005
Springer
15 years 3 months ago
Bayesian Networks Learning for Gene Expression Datasets
DNA arrays yield a global view of gene expression and can be used to build genetic networks models, in order to study relations between genes. Literature proposes Bayesian network ...
Giacomo Gamberoni, Evelina Lamma, Fabrizio Riguzzi...
FMCO
2004
Springer
123views Formal Methods» more  FMCO 2004»
15 years 1 months ago
rCOS: Refinement of Component and Object Systems
Abstract. We present a model of object-oriented and component-based refinement. For object-orientation, the model is class-based and refinement is about correct changes in the stru...
Zhiming Liu, Jifeng He, Xiaoshan Li
MASCOTS
2010
14 years 11 months ago
On the Universal Generation of Mobility Models
Mobility models have traditionally been tailored to specific application domains such as human, military, or ad hoc transportation scenarios. This tailored approach often renders a...
Alberto Medina, Gonca Gursun, Prithwish Basu, Ibra...
FORTE
2008
14 years 11 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...