Sciweavers

1453 search results - page 110 / 291
» State and history in operating systems
Sort
View
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 1 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
94
Voted
RTAS
2005
IEEE
15 years 6 months ago
Out-of-Norm Assertions
Abstract— The increasing use of electronics in transport systems, such as the automotive and avionic domain, has lead to dramatic improvements with respect to functionality, safe...
Philipp Peti, Roman Obermaisser, Hermann Kopetz
IM
2007
15 years 16 days ago
A Service Middleware that Scales in System Size and Applications
We present a peer-to-peer service management middleware that dynamically allocates system resources to a large set of applications. The system achieves scalability in number of no...
Constantin Adam, Rolf Stadler, Chunqiang Tang, Mal...
78
Voted
ACSAC
2002
IEEE
15 years 5 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
125
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Dual-Hop Adaptive Packet Transmission with Regenerative Relaying for Wireless TDD Systems
We consider the design and performance analysis of adaptive modulation and coding (AMC) applied to regenerative dual-hop transmission systems, where a source node communicates with...
Andreas Muller, Hong-Chuan Yang