Sciweavers

963 search results - page 96 / 193
» Modeling and analysis of real -time systems with mutex compo...
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
15 years 3 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
CJ
2006
100views more  CJ 2006»
14 years 12 months ago
Fuzzifying P Systems
Abstract. Uncertainty is an inherent property of all living systems. Curiously enough, computational models inspired by biological systems do not take, in general, under considerat...
Apostolos Syropoulos
DATE
1999
IEEE
139views Hardware» more  DATE 1999»
15 years 4 months ago
OpenJ: An Extensible System Level Design Language
There is an increasing research interest in system level design languages which can carry designers from specification to implementation of system-on-a-chip. Unfortunately, two of...
Jianwen Zhu, Daniel Gajski
JPDC
2006
112views more  JPDC 2006»
14 years 12 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...