Sciweavers

1362 search results - page 201 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 5 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou
ICNP
2009
IEEE
15 years 23 days ago
End-to-End Versus Hop-by-Hop Soft State Refresh for Multi-hop Signaling Systems
Abstract--To ensure state synchronization of signalling operations, many signaling protocol designs choose to establish "soft" state that expires if it is not refreshed. ...
Xiaoming Fu, Jianhua He
PADS
1999
ACM
15 years 7 months ago
Scheduling Critical Channels in Conservative Parallel Discrete Event Simulation
This paper introduces the Critical Channel Traversing (CCTJ algorithm, a new scheduling algorithm for both sequential and parallel discrete event simulation. CCT is a general cons...
Xiao Zhonge, Brian Unger, Rob Simmonds, John G. Cl...
POPL
2012
ACM
13 years 10 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
ICNS
2009
IEEE
15 years 23 days ago
A BitTorrent Performance Evaluation Framework
In the last decade, file sharing systems have generally been dominated by P2P solutions. Whereas e-mail and HTTP have been the killer apps of the earlier Internet, a large percent...
Razvan Deaconescu, Razvan Rughinis, Nicolae Tapus