Sciweavers

854 search results - page 64 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
IJFCS
2008
81views more  IJFCS 2008»
14 years 11 months ago
Reachability Analysis in Verification via Supercompilation
Abstract. We present an approach to verification of parameterized systems, which is based on program transformation technique known as supercompilation. In this approach the statem...
Alexei Lisitsa, Andrei P. Nemytykh
SIGCOMM
1998
ACM
15 years 3 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
GECCO
2004
Springer
15 years 4 months ago
Systematic Integration of Parameterized Local Search Techniques in Evolutionary Algorithms
Application-specific, parameterized local search algorithms (PLSAs), in which optimization accuracy can be traded off with runtime, arise naturally in many optimization contexts....
Neal K. Bambha, Shuvra S. Bhattacharyya, Jürg...
101
Voted
UPP
2004
Springer
15 years 4 months ago
Autonomic Computing: An Overview
Abstract. The increasing scale complexity, heterogeneity and dynamism of networks, systems and applications have made our computational and information infrastructure brittle, unma...
Manish Parashar, Salim Hariri
ICST
2008
IEEE
15 years 5 months ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...