Sciweavers

3256 search results - page 624 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
JEI
2008
116views more  JEI 2008»
14 years 8 months ago
Region-of-interest processing for electronic visual prostheses
Electronic visual prostheses, or "bionic eyes," are likely to provide some coarse visual sensations to blind patients who have these systems implanted. The quality of art...
Justin R. Boyle, Anthony J. Maeder, Wageeh W. Bole...
ICFEM
2009
Springer
15 years 4 months ago
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Péter Bokor, Marco Serafini, Neeraj Suri, H...
DSN
2006
IEEE
15 years 3 months ago
BlueGene/L Failure Analysis and Prediction Models
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM’s BlueGene/L which can acc...
Yinglung Liang, Yanyong Zhang, Anand Sivasubramani...
RSA
2000
170views more  RSA 2000»
14 years 9 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski