Sciweavers

2838 search results - page 325 / 568
» Verifying Controlled Components
Sort
View
80
Voted
TSMC
2010
14 years 7 months ago
Pervasive Diagnosis
In model-based control, a planner uses a system description to create a plan that achieves production goals. The same model can be used by model-based diagnosis to indirectly infe...
Lukas Kuhn, Bob Price, Minh Binh Do, Juan Liu, Ron...
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 7 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
115
Voted
WPES
2005
ACM
15 years 6 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
115
Voted
ICSE
2010
IEEE-ACM
15 years 2 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
SIROCCO
2004
15 years 2 months ago
Asynchronous Broadcast in Radio Networks
Abstract. We study asynchronous packet radio networks in which transmissions among nodes may be delayed. We consider the task of broadcasting a message generated by the source node...
Bogdan S. Chlebus, Mariusz A. Rokicki