Sciweavers

1054 search results - page 170 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
127
Voted
NDSS
2005
IEEE
15 years 7 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ATAL
2005
Springer
15 years 7 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
BPM
2005
Springer
85views Business» more  BPM 2005»
15 years 7 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...
DOCENG
2004
ACM
15 years 7 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
15 years 7 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...