Sciweavers

2558 search results - page 436 / 512
» Model Composition Contracts
Sort
View
FSTTCS
2003
Springer
15 years 9 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
INFOCOM
2002
IEEE
15 years 8 months ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das
IPPS
2002
IEEE
15 years 8 months ago
A Framework for Using Benefit Functions In Complex Real Time Systems
Researchers are currently investigating applying benefit, or utility functions for allocating resources in limited, soft real time systems [1,2,3]. While the future of real -time ...
David L. Andrews, Lonnie R. Welch, David M. Chelbe...
KBSE
2002
IEEE
15 years 8 months ago
Generating Product-Lines of Product-Families
GenVoca is a methodology and technology for generating product-lines, i.e. building variants of a program. The primitive components from which applications are constructed are ref...
Don S. Batory, Roberto E. Lopez-Herrejon, Jean-Phi...
FASE
2001
Springer
15 years 8 months ago
A CSP View on UML-RT Structure Diagrams
Abstract. UML-RT is an extension of UML for modelling embedded reactive and real-time software systems. Its particular focus lies on system descriptions on the architectural level,...
Clemens Fischer, Ernst-Rüdiger Olderog, Heike...