Sciweavers

220 search results - page 4 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 3 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
ICTAC
2005
Springer
15 years 3 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
85
Voted
ASIASIM
2004
Springer
15 years 2 months ago
Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study
Abstract. It is important to simulate a groundwater transport process, e.g., pollutant migration, through the vadose zone and subsequent mixing within the saturated zone to assess ...
Samuel S. Lee, Hoh Peter In
ICNS
2009
IEEE
15 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
DAC
1999
ACM
15 years 10 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak