Search
Now showing items 81-90 of 90
A rewriting logic-based computation and deduction approach to avoid reactive system malfunctions
(
IEEE
, 2003 , Conference Paper)
Maude is, a powerful formal declarative programming language based on rewriting logic. Because of the reflective characteristic of the rewriting logic, Maude is considered by the scientific community as a universal model ...
A toolset for the specification and verification of embedded systems
(
IEEE
, 2003 , Conference Paper)
Because of many malfunctions of some critical real-time systems (Pentium bug, Ariane lance rocket), which have caused life and billion dollars loss, computer aided formal methods have been developed and successfully applied ...
Digital government service machine DGSM
(
IEEE
, 2008 , Conference Paper)
The rapid improvement in latest technologies motivates individuals to progress in their societies. Fast and worthy can be significant titles for the demands of this modern life. And because of technology improvements, there ...
Efficient forward error correction for reliable transmission in packet networks
(
dblp computer science bibliography
, 2008 , Conference Paper)
This paper proposes an approach that utilizes a new forward error correction mechanism for reconstructing lost or corrupted packets sent over a Network. Instead of retransmissions of lost or corrupted packets, the new ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Wireless application deploying cell broadcast, and bulk SMS/MMS
(
International Business Information Management Association, IBIMA
, 2009 , Conference Paper)
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
SecCom: A prototype for integrating security-aware components
(
Springer Verlag
, 2009 , Conference Paper)
This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...