Sciweavers

1362 search results - page 154 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
SIGSOFT
2003
ACM
16 years 4 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
ICNP
2003
IEEE
15 years 8 months ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
15 years 10 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...
CN
2004
94views more  CN 2004»
15 years 3 months ago
A performance study of power-saving polices for Wi-Fi hotspots
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the shortage of energetic resources in mobile devices. Leg...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
INFOCOM
2006
IEEE
15 years 9 months ago
Density-Based vs. Proximity-Based Anycast Routing for Mobile Networks
— Existing anycast routing protocols solely route packets to the closest group member. In this paper, we introduce density-based anycast routing, a new anycast routing strategy p...
Vincent Lenders, Martin May, Bernhard Plattner