Sciweavers

6907 search results - page 951 / 1382
» Securing distributed adaptation
Sort
View
142
Voted
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
126
Voted
TASE
2008
IEEE
15 years 3 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
137
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
131
Voted
ICICS
2009
Springer
15 years 1 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
121
Voted
CCR
2010
97views more  CCR 2010»
15 years 28 days ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman