Sciweavers

3318 search results - page 315 / 664
» The Weak Instance Model
Sort
View
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
15 years 11 months ago
Compositional design of isochronous systems
The synchronous modeling paradigm provides strong execution correctness guarantees to embedded system design while making minimal environmental assumptions. In most related framew...
Jean-Pierre Talpin, Julien Ouy, Loïc Besnard,...
GPCE
2007
Springer
15 years 11 months ago
A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures
Maintaining integrity, consistency, and enforcing conformance in architectures of large-scale systems requires specification and enforcement of many different forms of structural...
Georg Jung, John Hatcliff
145
Voted
ISW
2007
Springer
15 years 11 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
156
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 11 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
146
Voted
IPPS
2006
IEEE
15 years 11 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...