Sciweavers

1432 search results - page 145 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
170
Voted
CMOT
2011
14 years 7 months ago
A generic architecture for redesign of organizations triggered by changing environmental circumstances
Artificial Intelligence has contributed (formal) design models and software support tools to application areas such as architecture, engineering and software design. This paper exp...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur
134
Voted
WSC
1998
15 years 5 months ago
Enterprise Architecture for Business Process Simulation
Many simulation systems are standalone, running only on a desktop and having limited capabilities to integrate with other technologies such as company databases, workflow engines,...
Ali Bahrami, Deborah A. Sadowski, Soheila Bahrami
141
Voted
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
15 years 8 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello
123
Voted
CCS
2006
ACM
15 years 7 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
125
Voted
SIGMETRICS
2008
ACM
15 years 3 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...