Sciweavers

1728 search results - page 234 / 346
» Formal Modeling of Process Migration
Sort
View
PERCOM
2006
ACM
16 years 10 days ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
118
Voted
COSIT
2009
Springer
114views GIS» more  COSIT 2009»
15 years 7 months ago
Spatio-terminological Inference for the Design of Ambient Environments
We present an approach to assist the smart environment design process by means of automated validation of work-in-progress designs. The approach facilitates validation of not only ...
Mehul Bhatt, Frank Dylla, Joana Hois
93
Voted
FM
2009
Springer
124views Formal Methods» more  FM 2009»
15 years 7 months ago
Reasoning about Memory Layouts
Verification methods for memory-manipulating C programs need to address not only well-typed programs that respect invariants such as the split heap memory model, but also programs...
Holger Gast
ICNP
2007
IEEE
15 years 7 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
ICALT
2006
IEEE
15 years 6 months ago
CPM: A UML Profile to Design Cooperative PBL Situations at Didactical Level
In this paper, we present our research results about a UML-based modeling language dedicated to Problem-Based Learning design. The CPM (Cooperative Problem-Based learning Metamode...
Thierry Nodenot, Pierre Laforcade