Sciweavers

2570 search results - page 405 / 514
» Reliability Modeling Using UML
Sort
View
113
Voted
ACISP
2007
Springer
15 years 6 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
112
Voted
EMSOFT
2006
Springer
15 years 6 months ago
Software partitioning for effective automated unit testing
A key problem for effective unit testing is the difficulty of partitioning large software systems into appropriate units that can be tested in isolation. We present an approach th...
Arindam Chakrabarti, Patrice Godefroid
129
Voted
DSN
2000
IEEE
15 years 6 months ago
Survivability Analysis of Network Specifications
Survivabilityis the ability of a system to maintain a set of essential services despite the presence of abnormal events such as faults and intrusions. Ensuring system survivabilit...
Sanjay K. Jha, Jeannette M. Wing, Richard C. Linge...
113
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 2 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
JPDC
2000
81views more  JPDC 2000»
15 years 2 months ago
A Dynamic Light-Weight Group Service
The virtual synchrony model for group communication has proven to be a powerful paradigm for building distributed applications. Implementations of virtual synchrony usually requir...
Luís Rodrigues, Katherine Guo, Paulo Ver&ia...