Sciweavers

4502 search results - page 729 / 901
» Regular Model Checking
Sort
View
SECON
2010
IEEE
15 years 2 months ago
Secondis: An Adaptive Dissemination Protocol for Synchronizing Wireless Sensor Networks
Reliability and predictability of the timing behavior have shown to be major issues for wireless sensor network deployments. Real-time requirements presented by several application...
Federico Ferrari, Andreas Meier, Lothar Thiele
WOA
2010
15 years 2 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
172
Voted
IEEEARES
2009
IEEE
15 years 2 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
COMSIS
2010
15 years 2 months ago
A domain-specific language for defining static structure of database applications
Abstract. In this paper we present DOMMLite - an extensible domainspecific language (DSL) for static structure definition of databaseoriented applications. The model-driven enginee...
Igor Dejanovic, Gordana Milosavljevic, Branko Peri...
JCS
2010
80views more  JCS 2010»
14 years 11 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...