Sciweavers

2342 search results - page 131 / 469
» Design, Implementation and Characterization of a Cooperative...
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
15 years 1 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
DATE
2005
IEEE
169views Hardware» more  DATE 2005»
15 years 3 months ago
Design Optimization of Time-and Cost-Constrained Fault-Tolerant Distributed Embedded Systems
In this paper we present an approach to the design optimization of faulttolerant embedded systems for safety-critical applications. Processes are statically scheduled and communic...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
INFOCOM
2008
IEEE
15 years 4 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
RSP
1999
IEEE
15 years 2 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
SIGSOFT
1994
ACM
15 years 2 months ago
Exploiting Style in Architectural Design Environments
As the design of software architectures emerges as a discipline within software engineering, it will become increasingly important to support architectural description and analysi...
David Garlan, Robert Allen, John Ockerbloom