Authenticated key-exchange protocols allow two participants Aand B, communicating over a public network and each holding an authentication means to ex...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive interactions may often occur between entities wit...
This paper deals with the problem of safety verification of nonlinear hybrid systems.We start from a classical method that uses interval arithmetic to...
publié le: December 2007
Many real-time systems, such as battery-operated embedded devices, are energy constrained. A common problem for these systems is how to reduce energy...
Physical database design tools rely on a DBA-provided workload to pick an “optimal” set of indexes and materialized views. Such tools allow either cre...