Sciweavers

4000 search results - page 164 / 800
» Simulation down under
Sort
View
144
Voted
ICECCS
1999
IEEE
140views Hardware» more  ICECCS 1999»
15 years 8 months ago
Practical Considerations in Protocol Verification: The E-2C Case Study
We report on our efforts to formally specify and verify a new protocol of the E-2C Hawkeye Early Warning Aircraft. The protocol, which is currently in test at Northrop Grumman, su...
Yifei Dong, Scott A. Smolka, Eugene W. Stark, Step...
138
Voted
IDA
1999
Springer
15 years 8 months ago
3D Grand Tour for Multidimensional Data and Clusters
Grand tour is a method for viewing multidimensional data via linear projections onto a sequence of two dimensional subspaces and then moving continuously from one projection to the...
Li Yang
114
Voted
SIGOPSE
1990
ACM
15 years 7 months ago
Availability in the Sprite distributed file system
In the Sprite environment, tolerating faults means recovering from them quickly. Our position is that performance and availability are the desired features of the typical locally-...
Mary Baker, John K. Ousterhout
ANCS
2007
ACM
15 years 7 months ago
Experimenting with buffer sizes in routers
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
121
Voted
CSFW
2007
IEEE
15 years 7 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis