Sciweavers

2259 search results - page 412 / 452
» Leveraging Distributed Software Development
Sort
View
ASE
2008
102views more  ASE 2008»
15 years 2 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
131
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 2 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
JCP
2006
115views more  JCP 2006»
15 years 2 months ago
Fault Tolerance in a Multi-Layered DRE System: A Case Study
Dynamic resource management is a crucial part of the infrastructure for emerging distributed real-time embedded systems, responsible for keeping mission-critical applications opera...
Paul Rubel, Joseph P. Loyall, Richard E. Schantz, ...
JHSN
2006
267views more  JHSN 2006»
15 years 2 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
ERCIM
2007
124views more  ERCIM 2007»
15 years 2 months ago
Cancer Treatment Planning with Grid-Based Technology
sented by abstract mathematical structures, and visualization is used to convert these into pictures. At the core of every simulation is a mathematical model that is evaluated by a...
Robert G. Belleman, Michael Scarpa, Bram Stolk