Sciweavers

1980 search results - page 216 / 396
» Compositional Model Checking of Real Time Systems
Sort
View
144
Voted
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 9 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
AINA
2008
IEEE
15 years 9 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
DSN
2005
IEEE
15 years 9 months ago
Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms
Designing a distributed fault tolerance algorithm requires careful analysis of both fault models and diagnosis strategies. A system will fail if there are too many active faults, ...
Elizabeth Latronico, Philip Koopman
174
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 10 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
117
Voted
RTAS
2008
IEEE
15 years 9 months ago
Access Control for Adaptive Reservations on Multi-User Systems
This paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security req...
Tommaso Cucinotta