Sciweavers

906 search results - page 124 / 182
» Linking Theories of Concurrency
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
APN
2009
Springer
15 years 4 months ago
Hasse Diagram Generators and Petri Nets
In [LJ06] Lorenz and Juh´as raised the question of whether there exists a suitable formalism for the representation of infinite families of partial orders generated by Petri nets...
Mateus de Oliveira Oliveira
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 4 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
14 years 1 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
POPL
2011
ACM
14 years 18 days ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...