Sciweavers

1336 search results - page 59 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
IPAW
2010
15 years 19 days ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
119
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
SERP
2003
15 years 4 months ago
A Process for BDI Agent-Based Software Construction
Agent-based programming comes us as a next generation programming paradigm. However, we have not been ready yet to fully use it without having sound and concrete software engineer...
Chang-Hyun Jo, Jeffery M. Einhorn
119
Voted
ISCAS
2002
IEEE
190views Hardware» more  ISCAS 2002»
15 years 8 months ago
Analysis and improvement of correlation-based watermarking methods for digital images
This paper aims to design robust correlation-based watermarking methods for images. We rst present a model of watermark embedding and extracting processes and carry out their ana...
Akio Miyazaki, Akihiro Okamoto
PNPM
1987
15 years 6 months ago
Stochastic Petri Net Analysis of a Replicated File System
We present a stochastic Petri net model of a replicated file system in a distributed environment where replicated files reside on different hosts and a voting algorithm is used to...
Joanne Bechta Dugan, Gianfranco Ciardo