Sciweavers

2747 search results - page 251 / 550
» Network externalities in software systems
Sort
View
127
Voted
AAAI
2004
15 years 2 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
IANDC
2008
128views more  IANDC 2008»
15 years 24 days ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
RTAS
2005
IEEE
15 years 6 months ago
Applying Sensitivity Analysis in Real-Time Distributed Systems
During real-world design of embedded real-time systems, it cannot be expected that all performance data required for scheduling analysis is fully available up front. In such situa...
Razvan Racu, Marek Jersak, Rolf Ernst
120
Voted
FORTE
1997
15 years 2 months ago
A Framework for Distributed Object-Oriented Testing
Distributed programming and object-oriented programming are two popular programming paradigms. The former is driven by advances in networking technology whereas the latter provide...
Alan C. Y. Wong, Samuel T. Chanson, Shing-Chi Cheu...
147
Voted
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 11 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch