Sciweavers

1222 search results - page 106 / 245
» Verifying a File System Implementation
Sort
View
122
Voted
IAT
2009
IEEE
15 years 9 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
ISPA
2004
Springer
15 years 8 months ago
HPL Performance Prevision to Intending System Improvement
HPL is a parallel Linpack benchmark package widely adopted in massive cluster system performance test. On HPL data layout among processors, a law to determine block size NB theoret...
Wenli Zhang, Mingyu Chen, Jianping Fan
121
Voted
CADE
1998
Springer
15 years 7 months ago
A Proof Environment for the Development of Group Communication Systems
Abstract. We present a theorem proving environment for the development of reliable and efficient group communication systems. Our approach makes methods of automated deduction appl...
Christoph Kreitz, Mark Hayden, Jason Hickey
150
Voted
CAV
2012
Springer
251views Hardware» more  CAV 2012»
13 years 5 months ago
A Model Checker for Hierarchical Probabilistic Real-Time Systems
Real-life systems are usually hard to control, due to their complicated structures, quantitative time factors and even stochastic behaviors. In this work, we present a model checke...
Songzheng Song, Jun Sun 0001, Yang Liu 0003, Jin S...
OTM
2007
Springer
15 years 8 months ago
A Role and Attribute Based Access Control System Using Semantic Web Technologies
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia