Sciweavers

974 search results - page 142 / 195
» Formal Modeling of Communication Traces
Sort
View
CSFW
2005
IEEE
15 years 5 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
WICSA
2004
15 years 22 days ago
An Architectural Approach to Mobility - The Handover Case Study
COMMUNITY is a formal approach to software architecture. Its main characteristics are: a precise, yet intuitive mathematical semantics based on categorical diagrams; a clear separ...
Cristóvão Oliveira, Michel Wermeling...
ECEASST
2008
83views more  ECEASST 2008»
14 years 11 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg
CORR
2006
Springer
105views Education» more  CORR 2006»
14 years 11 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
ETT
2002
142views Education» more  ETT 2002»
14 years 11 months ago
Adaptive state- dependent importance sampling simulation of markovian queueing networks
In this paper, a method is presented for the efficient estimation of rare-event (buffer overflow) probabilities in queueing networks using importance sampling. Unlike previously pr...
Pieter-Tjerk de Boer, Victor F. Nicola