Sciweavers

2467 search results - page 334 / 494
» Finite State Machines
Sort
View
ICSE
2001
IEEE-ACM
15 years 5 months ago
A Framework for Multi-Valued Reasoning over Inconsistent Viewpoints
In requirements elicitation, different stakeholders often hold different views of how a proposed system should behave, resulting in inconsistencies between their descriptions. Con...
Steve M. Easterbrook, Marsha Chechik
DSN
2000
IEEE
15 years 5 months ago
Exploiting Non-Determinism for Reliability of Mobile Agent Systems
An important technical hurdle blocking the adoption of mobile agent technology is the lack of reliability. Designing a reliable mobile agent system is especially challenging since...
Ajay Mohindra, Apratim Purakayastha, Prasannaa Tha...
ACSD
2004
IEEE
125views Hardware» more  ACSD 2004»
15 years 4 months ago
Comparison of Methods for Supervisory Control and Submodule Construction
Over the last 25 years, methods for supervisory control of discrete event systems and methods for submodule construction based on state machine specifications have been developed ...
Gregor von Bochmann, Bassel Daou
CCS
2008
ACM
15 years 3 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
DAGSTUHL
2004
15 years 2 months ago
Audition of Web Services for Testing Conformance to Open Specified Protocols
Abstract. A Web Service (WS) is a type of component specifically conceived for distributed machine-to-machine interaction. Interoperability between WSs involves both data and messa...
Antonia Bertolino, Lars Frantzen, Andrea Polini, J...