Sciweavers

3104 search results - page 212 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 8 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
15 years 11 months ago
A Vision-Based Control and Interaction Framework for a Legged Underwater Robot
We present a vision-based control and interaction framework for mobile robots, and describe its implementation in a legged amphibious robot. The control scheme enables the robot t...
Junaed Sattar, Gregory Dudek
USENIX
1996
15 years 5 months ago
lmbench: Portable Tools for Performance Analysis
lmbench is a micro-benchmark suite designed to focus attention on the basic building blocks of many common system applications, such as databases, simulations, software developmen...
Larry W. McVoy, Carl Staelin
WORDS
2002
IEEE
15 years 9 months ago
Schedulability Analysis of an Event-Based Real-Time Protocol Framework
This paper presents a method to analyze the timing behavior of an event-based real-time protocol composition framework. The framework, called RT-Appia, allows the development and ...
João Rodrigues, João Ventura, Lu&iac...
ISSTA
2004
ACM
15 years 10 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner