Sciweavers

2067 search results - page 180 / 414
» Modeling and Simulation of Operating System Behavior
Sort
View
140
Voted
IJCSA
2006
95views more  IJCSA 2006»
15 years 2 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
112
Voted
WSC
2008
15 years 4 months ago
Better than a petaflop: The power of efficient experimental design
Recent advances in high-performance computing have pushed computational capabilities to a petaflop (a thousand trillion operations per second) in a single computing cluster. This ...
Susan M. Sanchez
HOLOMAS
2009
Springer
15 years 7 months ago
Mobility Model for Tactical Networks
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...
Milan Rollo, Antonín Komenda
138
Voted
ICONS
2008
IEEE
15 years 9 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
149
Voted
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
13 years 10 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili