Sciweavers

3555 search results - page 647 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
LCN
2006
IEEE
15 years 7 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
ESORICS
2008
Springer
15 years 3 months ago
State Space Reduction in the Maude-NRL Protocol Analyzer
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different ...
Santiago Escobar, Catherine Meadows, José M...
FOIS
2006
15 years 2 months ago
Qualities in Possible Worlds
The paper analyzes how and under which assumptions it is possible to compare (in a relationist setting and relatively to qualities) entities living in different worlds. We begin wi...
Stefano Borgo, Claudio Masolo
ICSE
2010
IEEE-ACM
15 years 6 months ago
An exploratory study of the evolution of software licensing
Free and open source software (FOSS) is distributed and made available to users under different software licenses, mentioned in FOSS code by means of licensing statements. Variou...
Massimiliano Di Penta, Daniel M. Germán, Ya...
WINET
2008
200views more  WINET 2008»
15 years 1 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...