Sciweavers

1497 search results - page 176 / 300
» Extended static checking
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 6 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
112
Voted
CSCLP
2004
Springer
15 years 6 months ago
Better Propagation for Non-preemptive Single-Resource Constraint Problems
Abstract. Overload checking, forbidden regions, edge finding, and notfirst/not-last detection are well-known propagation rules to prune the start times of activities which have t...
Armin Wolf
56
Voted
IPPS
2003
IEEE
15 years 6 months ago
Parallel LAN/WAN Heuristics for Optimization
We present in this work a wide spectrum of results on analyzing the behavior of parallel heuristics for solving optimization problems. We focus on evolutionary algorithms as well ...
Enrique Alba, Gabriel Luque
84
Voted
LICS
2003
IEEE
15 years 6 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
98
Voted
MEMOCODE
2003
IEEE
15 years 6 months ago
Real-time Property Preservation in Approximations of Timed Systems
Formal techniques have been widely applied in the design of real-time systems and have significantly helped detect design errors by checking real-time properties of the model. Ho...
Jinfeng Huang, Jeroen Voeten, Marc Geilen