Sciweavers

1092 search results - page 48 / 219
» aime 2009
Sort
View
VMCAI
2009
Springer
15 years 4 months ago
Model-Checking the Linux Virtual File System
This paper presents a case study in modelling and verifying the Linux Virtual File System (VFS). Our work is set in the context of Hoare’s verification grand challenge and, in p...
Andy Galloway, Gerald Lüttgen, Jan Tobias M&u...
WISTP
2009
Springer
15 years 4 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
CEC
2009
IEEE
15 years 4 months ago
Evolution of cooperation on different pairs of interaction and replacement networks with various intensity of selection
— There are various discussions on the evolution of cooperation on different pairs of interaction network for playing games and the replacement network for imitation of strategie...
Reiji Suzuki, Takaya Arita
CEC
2009
IEEE
15 years 4 months ago
Birds on the wall: Distributing a process-oriented simulation
— The CoSMoS project aims to develop reusable tools and techniques for complex systems modelling and simulation. Using process-oriented software design techniques, we have built ...
Adam T. Sampson, John Markus Bjørndalen, Pa...
CSE
2009
IEEE
15 years 4 months ago
Privacy in Online Social Networking at Workplace
—Employees using social network sites (SNS) at workplace is a fact. As companies are further embracing social media, how if at all does this practice affect the work dynamics? Wh...
Yang Wang 0005, Alfred Kobsa