Sciweavers

3357 search results - page 494 / 672
» Controlling Complexity
Sort
View
CSFW
2007
IEEE
15 years 8 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 8 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
HASE
2007
IEEE
15 years 8 months ago
A Fault Taxonomy for Service-Oriented Architecture
—Service-Oriented Architecture (SOA) is a popular design paradigm for distributed systems today. Its dynamics and loose coupling are predestined for self-adaptive systems. This a...
Stefan Brüning, Stephan Weißleder, Miro...
IAT
2007
IEEE
15 years 8 months ago
An Application of Automated Negotiation to Distributed Task Allocation
Through automated negotiation we aim to improve task allocation in a distributed sensor network. In particular, we look at a type of adaptive weather-sensing radar that permits th...
Michael Krainin, Bo An, Victor R. Lesser
ICC
2007
IEEE
15 years 8 months ago
Power Managed Packet Switching
— High power dissipation in packet switches and routers is fast turning into a key problem, owing to increasing line speeds and decreasing chip sizes. To address this issue, we i...
Aditya Dua, Benjamin Yolken, Nicholas Bambos