Sciweavers

4520 search results - page 34 / 904
» Algebraic Techniques for Timed Systems
Sort
View
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 7 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
VLDB
1987
ACM
78views Database» more  VLDB 1987»
15 years 5 months ago
Measured Performance of Time Interval Concurrency Control Techniques
This paper reports on an implementation of Bayer's Time Interval concurrency control method and compares it to the performance of a conventional timestamp method. The impleme...
Jerre D. Noe, David B. Wagner
EMSOFT
2007
Springer
15 years 8 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
ECOOP
1995
Springer
15 years 5 months ago
Time and Asynchrony in Interactions among Distributed Real-Time Objects
Abstract. This paper presents a framework of specification and verification for distributed real-time object-oriented systems. An earlier paper [17] introduced a process calculus...
Ichiro Satoh, Mario Tokoro
APLAS
2005
ACM
15 years 7 months ago
Calculating Polynomial Runtime Properties
Affine size-change analysis has been used for termination analysis of eager functional programming languages. The same style of analysis is also capable of compactly recording and ...
Hugh Anderson, Siau-Cheng Khoo, Stefan Andrei, Bea...