Sciweavers

4305 search results - page 582 / 861
» Analysing Protocol Implementations
Sort
View
CNSR
2005
IEEE
15 years 10 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
COMPSAC
2005
IEEE
15 years 10 months ago
Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services
Web services and service-oriented architecture are emerging technologies that are changing the way we develop and use computer software. Due to the standardization of web services...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Hu...
DATE
2005
IEEE
169views Hardware» more  DATE 2005»
15 years 10 months ago
Design Optimization of Time-and Cost-Constrained Fault-Tolerant Distributed Embedded Systems
In this paper we present an approach to the design optimization of faulttolerant embedded systems for safety-critical applications. Processes are statically scheduled and communic...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
DSRT
2005
IEEE
15 years 10 months ago
A Multi-Formalism Modeling Composability Framework: Agent and Discrete-Event Models
It is common practice to build complex systems from disparate sub-systems. Model composability is concerned with techniques for developing a whole model of a system from the model...
Hessam S. Sarjoughian, Dongping Huang
EEE
2005
IEEE
15 years 10 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry