Sciweavers

458 search results - page 71 / 92
» Designing and executing protocols using the event calculus
Sort
View
VTC
2010
IEEE
164views Communications» more  VTC 2010»
15 years 3 months ago
Metrics for Performance Prediction of Wireless Sensor Networks
—We present the derivation of a novel metric for the performance prediction of Wireless Sensor Networks (WSNs). In particular, the metric can be applied in, for example, monitori...
Frank Oldewurtel, Petri Mähönen
WSC
2001
15 years 6 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CODES
2008
IEEE
15 years 7 months ago
Performance debugging of Esterel specifications
Synchronous languages like Esterel have been widely adopted for designing reactive systems in safety-critical domains such as avionics. Specifications written in Esterel are based...
Lei Ju, Bach Khoa Huynh, Abhik Roychoudhury, Samar...
189
Voted
EMSOFT
2011
Springer
14 years 4 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...