Sciweavers

1541 search results - page 258 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
145
Voted
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 10 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
ECLIPSE
2005
ACM
15 years 2 months ago
ConcernMapper: simple view-based separation of scattered concerns
We introduce ConcernMapper, an Eclipse plug-in for experimenting with techniques for advanced separation of concerns. ConcernMapper supports development and maintenance tasks invo...
Martin P. Robillard, Frédéric Weigan...
BMCBI
2006
122views more  BMCBI 2006»
15 years 17 days ago
A multivariate prediction model for microarray cross-hybridization
Background: Expression microarray analysis is one of the most popular molecular diagnostic techniques in the post-genomic era. However, this technique faces the fundamental proble...
Yian A. Chen, Cheng-Chung Chou, Xinghua Lu, Elizab...
119
Voted
TWC
2011
291views more  TWC 2011»
14 years 7 months ago
On Optimal Cooperator Selection Policies for Multi-Hop Ad Hoc Networks
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Michele Rossi, Cristiano Tapparello, Stefano Tomas...
103
Voted
PDPTA
2004
15 years 1 months ago
Design of a Real-Time Scheduler for Kahn Process Networks on Multiprocessor Systems
High-throughput real-time systems require non-standard and costly hardware and software solutions. Modern workstation can represent a credible alternative to develop realtime inte...
Javed Dulloo, Philippe Marquet