Sciweavers

426 search results - page 36 / 86
» Towards Verifying Model Transformations
Sort
View
JSS
2006
153views more  JSS 2006»
14 years 9 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
73
Voted
IJFCS
2006
119views more  IJFCS 2006»
14 years 9 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
SACMAT
2009
ACM
15 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
IJBRA
2007
84views more  IJBRA 2007»
14 years 9 months ago
Is the protein folding an aim-oriented process? Human haemoglobin as example
: The model for protein folding (in silico) simulation is presented. Three steps have been implemented: • early stage folding based on the backbone conformation • hydrophobic c...
Michal Brylinski, Leszek Konieczny, Irena Roterman
ICECCS
2010
IEEE
161views Hardware» more  ICECCS 2010»
14 years 10 months ago
Model Checking Round-Based Distributed Algorithms
—In the field of distributed computing, there are many round-based algorithms to solve fundamental problems, such as leader election and distributed consensus. Due to the nature...
Xin An, Jun Pang