Sciweavers

5525 search results - page 257 / 1105
» Verification of Model Transformations
Sort
View
EDOC
2005
IEEE
15 years 10 months ago
An Aspect Oriented Model Driven Framework
In model driven development (MDD), specifying transformations between models at various levels of ion can be a complex task. Specifying transformations for pervasive system featur...
Devon M. Simmonds, Raghu Reddy, Robert B. France, ...
VMCAI
2010
Springer
16 years 2 months ago
Best Probabilistic Transformers
This paper investigates relative precision and optimality of analyses for concurrent probabilistic systems. Aiming at the problem at the heart of probabilistic model checking ? com...
Björn Wachter, Lijun Zhang
144
Voted
ISLPED
1995
ACM
125views Hardware» more  ISLPED 1995»
15 years 8 months ago
Transforming set data types to power optimal data structures
In this paper we present a novel approach to model the search space for optimal set data types in network component realisations. The main objective is to arrive at power efficie...
Sven Wuytack, Francky Catthoor, Hugo De Man
CCS
2008
ACM
15 years 7 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ESORICS
2008
Springer
15 years 6 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...