Sciweavers

416 search results - page 33 / 84
» Enough of Processes - Lets do Practices
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
LICS
2002
IEEE
15 years 2 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
LADC
2011
Springer
14 years 16 days ago
Timing Analysis of Leader-Based and Decentralized Byzantine Consensus Algorithms
—We compare in an analytical way two leader-based and decentralized algorithms (that is, algorithms that do not use a leader) for Byzantine consensus with strong validity. We sho...
Fatemeh Borran, Martin Hutle, André Schiper
73
Voted
WICSA
2008
14 years 11 months ago
Developing Value Assessment for SW Architecture
During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also be...
Pasi Ojala
79
Voted
IFIP13
2004
14 years 11 months ago
Failure Analysis and the Safety-Case Lifecycle
: The failure of a safety-critical system, though undesirable, is often a source of valuable lessons that can help prevent future failures. Current analysis practices do not always...
William S. Greenwell, Elisabeth A. Strunk, John C....