Sciweavers

9842 search results - page 310 / 1969
» Compositional timing analysis
Sort
View
CCS
2001
ACM
15 years 9 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
BIB
2008
113views more  BIB 2008»
15 years 4 months ago
Identification of replication origins in prokaryotic genomes
The availability of hundreds of complete bacterial genomes has created new challenges and simultaneously opportunities for bioinformatics. In the area of statistical analysis of g...
Natalia V. Sernova, Mikhail S. Gelfand
133
Voted
TELSYS
2002
126views more  TELSYS 2002»
15 years 4 months ago
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs
Formal description techniques, verification methods, and their tool-based automated application meanwhile provide valuable support for the formal analysis of communication protocol...
Peter Herrmann, Heiko Krumm, Olaf Drögehorn, ...
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 10 months ago
Some theoretical results about the computation time of evolutionary algorithms
This paper focuses on the computation time of evolutionary algorithms. First, some exact expressions of the mean first hitting times of general evolutionary algorithms in finite...
Lixin X. Ding, Jinghu Yu
TC
2008
15 years 4 months ago
Minimum Deadline Calculation for Periodic Real-Time Tasks in Dynamic Priority Systems
Real-time systems are often designed using a set of periodic tasks. Task periods are usually set by the system requirements, but deadlines and computation times can be modified in ...
Patricia Balbastre, Ismael Ripoll, Alfons Crespo