-
2
-
-
0344044989
-
-
Oracle Corporation
-
Oracle Corporation, Java Message Service API Rev. 1.1, 2002. Available at http://java.sun.com/products/jms/.
-
(2002)
Java Message Service API Rev. 1.1
-
-
-
5
-
-
8744222139
-
Automatic circuit verification using temporal logic: Two new examples
-
Elsevier Science Publishers (North Holland)
-
M. C. Browne, E. M. Clarke and D. Dill. Automatic circuit verification using temporal logic: Two new examples. In Formal Aspects of VLSI Design. Elsevier Science Publishers (North Holland) 1986
-
(1986)
Formal Aspects of VLSI Design
-
-
Browne, M.C.1
Clarke, E.M.2
Dill, D.3
-
6
-
-
0022890039
-
Automatic circuit verification using temporal logic
-
M. C. Browne, E. M. Clarke, D. Dill and B. Mishra. Automatic circuit verification using temporal logic. IEEE Transactions on Computers, C-35(12): 1035-1044. 1986
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.12
, pp. 1035-1044
-
-
Browne, M.C.1
Clarke, E.M.2
Dill, D.3
Mishra, B.4
-
9
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
R. E. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8), 1986
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
-
-
Bryant, R.E.1
-
11
-
-
74249092475
-
Adaptive security and trust management for autonomic message-oriented middleware
-
HabtamuAbie
-
HabtamuAbie. 'Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware'MobileAdhoc and Sensor Systems, 2009. MASS'09. 2009
-
(2009)
MobileAdhoc and Sensor Systems, 2009. MASS'09
-
-
-
12
-
-
71949086200
-
Network configuration in a box: Towards end-to-end verification of network reachability and security
-
E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi. 'Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security' In Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP), pages 123-132, 2009.
-
(2009)
Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP)
, pp. 123-132
-
-
Al-Shaer, E.1
Marrero, W.2
El-Atawy, A.3
Elbadawi, K.4
-
13
-
-
65249107656
-
Shadow configurationas a network management primitive
-
New York, NY, USA, ACM
-
Richard Alimi, Ye Wang, and Y. Richard Yang.'Shadow configurationas a network management primitive' In SIGCOMM '08: Proceedings ofthe ACM SIGCOMM 2008 conference on Data communication, pages111-122, New York, NY, USA, 2008. ACM.
-
(2008)
SIGCOMM '08: Proceedings Ofthe ACM SIGCOMM 2008 Conference on Data Communication
, pp. 111-122
-
-
Alimi, R.1
Wang, Y.2
Richard Yang, Y.3
-
14
-
-
84981550540
-
Using style to understand descriptions of software architecture
-
ACM Press, December
-
G. Abowd, R. Allen, and D. Garlan. Using style to understand descriptions of software architecture. In Proceedings of SIGSOFT'93: Foundations of Software Engineering, Software Engineering Notes 18(5). ACM Press, December 1993.
-
(1993)
Proceedings of SIGSOFT'93: Foundations of Software Engineering, Software Engineering Notes
, vol.18
, Issue.5
-
-
Abowd, G.1
Allen, R.2
Garlan, D.3
-
15
-
-
0030264523
-
A framework for event-based software integration
-
October
-
D. J. Barrett, L. A. Clarke, P. L. Tarr, and A. E. Wise. A framework for event-based software integration. ACM Transactions on Software Engineering and Methodology, 5(4):378-421, October 1996.
-
(1996)
ACM Transactions on Software Engineering and Methodology
, vol.5
, Issue.4
, pp. 378-421
-
-
Barrett, D.J.1
Clarke, L.A.2
Tarr, P.L.3
Wise, A.E.4
-
16
-
-
0032218202
-
Reasoning about implicit invocation
-
Lake Buena Vista, Florida, November. ACM
-
J. Dingel, D. Garlan, S. Jha, and D. Notkin. Reasoning about Implicit Invocation. In Proceedings of the Sixth International Symposium on the Foundations of Software Engineering (FSE-6), Lake Buena Vista, Florida, November 1998. ACM.
-
(1998)
Proceedings of the Sixth International Symposium on the Foundations of Software Engineering (FSE-6)
-
-
Dingel, J.1
Garlan, D.2
Jha, S.3
Notkin, D.4
-
17
-
-
1542295534
-
Towards a formal treatment of implicit invocation
-
J. Dingel, D. Garlan, S. Jha, and D. Notkin. Towards a formal treatment of implicit invocation. Formal Aspects of Computing, 10:193-213, 1998.
-
(1998)
Formal Aspects of Computing
, vol.10
, pp. 193-213
-
-
Dingel, J.1
Garlan, D.2
Jha, S.3
Notkin, D.4
-
18
-
-
84976813340
-
Formalizing design spaces: Implicit invocation mechanisms
-
Noordwijkerhout, The Netherlands, October. Springer-Verlag, LNCS 551
-
D. Garlan and D. Notkin. Formalizing design spaces: Implicit invocation mechanisms. In VDM'91: Formal Software Development Methods, pages 31-44, Noordwijkerhout, The Netherlands, October 1991. Springer-Verlag, LNCS 551.
-
(1991)
VDM'91: Formal Software Development Methods
, pp. 31-44
-
-
Garlan, D.1
Notkin, D.2
-
19
-
-
35248812971
-
Model checking publish-subscribe systems[M]
-
Springer Berlin Heidelberg
-
Garlan D, Khersonsky S, Kim J S. Model checking publish-subscribe systems[M]//Model Checking Software. Springer Berlin Heidelberg, 2003: 166-180.
-
(2003)
Model Checking Software
, pp. 166-180
-
-
Garlan, D.1
Khersonsky, S.2
Kim, J.S.3
-
20
-
-
33749411354
-
Implementation and verification of implicit-invocation systems using source transformation
-
H. Zhang, J. S. Bradbury, J. R. Cordy, and J. Dingel. Implementation and verification of implicit-invocation systems using source transformation. In Proc. of the 5th Int. Wkshp. on Source Code Analysis and Manipulation (SCAM05), pages 87-96, 2005.
-
(2005)
Proc. of the 5th Int. Wkshp. on Source Code Analysis and Manipulation (SCAM05)
, pp. 87-96
-
-
Zhang, H.1
Bradbury, J.S.2
Cordy, J.R.3
Dingel, J.4
-
22
-
-
84904208327
-
Checking the Robustness of a Publish/Subscribe Based Message Oriented System
-
October
-
Y. Jia, E. Bodanese, J. Bigham, 'Checking the Robustness of a Publish/Subscribe Based Message Oriented System', IV International Congress on Ultra Modern Telecommunications and Control Systems, pp 291-296, October 2012.
-
(2012)
IV International Congress on Ultra Modern Telecommunications and Control Systems
, pp. 291-296
-
-
Jia, Y.1
Bodanese, E.2
Bigham, J.3
-
23
-
-
84904160197
-
-
IBM T. J. Watson Research Centre
-
Hao Yang, Minkyong Kim, KyriakosKarenos, Fan Ye, and Hui Lei,'Message-Oriented Middleware with QoS Awareness'IBM T. J. Watson Research Centre 2009.
-
(2009)
Message-Oriented Middleware with QoS Awareness
-
-
Yang, H.1
Kim, M.2
Karenos, K.3
Ye, F.4
Lei, H.5
-
26
-
-
84948459940
-
Implementation of recurrent neural network algorithm for shortest path calculation in network routing[C]
-
IEEE
-
Shaikh-Husin N, Hani M K, Seng T G. Implementation of recurrent neural network algorithm for shortest path calculation in network routing[C]//Parallel Architectures, Algorithms and Networks, 2002. I-SPAN'02. Proceedings. International Symposium on. IEEE, 2002: 313-317.
-
(2002)
Parallel Architectures, Algorithms and Networks, 2002. I-SPAN'02. Proceedings. International Symposium on
, pp. 313-317
-
-
Shaikh-Husin, N.1
Hani, M.K.2
Seng, T.G.3
|