Search
Now showing items 11-20 of 47
Wireless application deploying cell broadcast, and bulk SMS/MMS
(
International Business Information Management Association, IBIMA
, 2009 , Conference Paper)
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
An efficient model checker based on theaxiomatization of Propositional Temporal Logic in rewriting logic
(
IEEE
, 2003 , Conference Paper)
In this paper, we propose an efficient Model Checker for the Propositional Temporal Logic denoted by PTL. This logic is hown to be well suited to verify electronic circuits and reactive systems. A typical verification ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
A rewriting logic-based computation and deduction approach to avoid reactive system malfunctions
(
IEEE
, 2003 , Conference Paper)
Maude is, a powerful formal declarative programming language based on rewriting logic. Because of the reflective characteristic of the rewriting logic, Maude is considered by the scientific community as a universal model ...
A neural network algorithm for hardware-software verification
(
IEEE
, 2003 , Conference Paper)
Formal verification is the task of proving that a property holds for a model of a design. This paper examines the idea of a Neural Network-based algorithm used to find the set of states that makes a specification valid. ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
A system for automatic gathering and intelligent analyses of Doha traffic data
(
Institute of Electrical and Electronics Engineers Inc.
, 2008 , Conference Paper)
In recent years, Intelligent Transportation Systems (ITS) have gained increased attention. ITS [1] [2] provide opportunities for traffic engineers and decision-makers to deal with problems related to highway traffic operation ...
A decision support system based on ranking methods
(
IEEE
, 2003 , Conference Paper)
The complexity of decision making in industrial and economic fields is a phenomenon that has become difficult to surmount. This makes the decision maker feel powerless in front of unpredictable, non understandable and ...
A toolset for the specification and verification of embedded systems
(
IEEE
, 2003 , Conference Paper)
Because of many malfunctions of some critical real-time systems (Pentium bug, Ariane lance rocket), which have caused life and billion dollars loss, computer aided formal methods have been developed and successfully applied ...