Sciweavers

612 search results - page 76 / 123
» Bounded model checking for knowledge and real time
Sort
View
WCET
2008
14 years 11 months ago
Applying WCET Analysis at Architectural Level
Real-Time embedded systems must enforce strict timing constraints. In this context, achieving precise Worst Case Execution Time is a prerequisite to apply scheduling analysis and ...
Olivier Gilles, Jérôme Hugues
ACSAC
2010
IEEE
14 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
WEA
2005
Springer
91views Algorithms» more  WEA 2005»
15 years 3 months ago
The Necessity of Timekeeping in Adversarial Queueing
We study queueing strategies in the adversarial queueing model. Rather than discussing individual prominent queueing strategies we tackle the issue on a general level and analyze c...
Maik Weinard
ICWS
2010
IEEE
14 years 11 months ago
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition
This paper presents a methodology and a set of tools for the modelling, validation and testing of Web service composition, conceived and developed within the French national projec...
Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, El...
CJ
2004
141views more  CJ 2004»
14 years 9 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini