Sciweavers

5863 search results - page 93 / 1173
» On Model-Checking of P Systems
Sort
View
138
Voted
I3E
2001
196views Business» more  I3E 2001»
15 years 2 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
91
Voted
SACMAT
2010
ACM
15 years 5 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CAV
2008
Springer
108views Hardware» more  CAV 2008»
15 years 2 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
FMCAD
2007
Springer
15 years 4 months ago
Combining Symbolic Simulation and Interval Arithmetic for the Verification of AMS Designs
Abstract--Analog and mixed signal (AMS) designs are important integrated circuits that are usually needed at the interface between the electronic system and the real world. Recentl...
Mohamed H. Zaki, Ghiath Al Sammane, Sofiène...
84
Voted
P2P
2007
IEEE
15 years 7 months ago
Price of Structured Routing and Its Mitigation in P2P Systems under Churn
Joseph S. Kong, Vwani P. Roychowdhury