Sciweavers

2607 search results - page 63 / 522
» On the Architecture of System Verification Environments
Sort
View
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 9 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
JCDL
2003
ACM
143views Education» more  JCDL 2003»
15 years 5 months ago
Integrating Digital Libraries into Learning Environments: The LEBONED Approach
This paper presents the project LEBONED that focuses on the integration of digital libraries and their contents into web-based learning environments. We describe in general how th...
Frank Oldenettel, Michael Malachinski, Dennis Reil
ACSAC
2002
IEEE
15 years 4 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
IFIP
1993
Springer
15 years 3 months ago
Plant Engineering: Conceptual Modeling and Modular Design of a Computer Aided Environment
When designing a plant for continuous or semi-continuous processes, such as paper pulp or petrochemical production systems, engineers face very complex tasks, which are only in pa...
Cláudio Walter, José Palazzo M. de O...
ASE
2008
102views more  ASE 2008»
14 years 12 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce