default search action
International Journal of Critical Computer-Based Systems, Volume 7
Volume 7, Number 1, 2017
- Mouloud Atmani, Djamil Aïssani, Yassine Hadjadj Aoul:
Modelling and analysis data fragmentation in IEEE 802.15.4 slotted CSMA/CA protocol without ACK mode. 4-21 - Alexander Gouberman, Martin Riedl, Markus Siegle:
Analysing reward measures of LARES performability models by discontinuous Markov chains. 22-42 - Mohamed Escheikh, Kamel Barkaoui:
On the dependability evaluation of a virtual multiple input multiple output link. 43-58 - Mohand Yazid, Louiza Bouallouche-Medjkoune, Djamil Aïssani:
Modelling and performance analysis of video and voice streams in the IEEE 802.11e-EDCA WLANs with TXOP bursting under fading channel. 59-77 - Nadjette Rebouh, Ifeticene Ryma Asma, Aidoun Naoual, Louiza Bouallouche-Medjkoune:
Failure detector-Ring Paxos-based atomic broadcast algorithm. 78-90 - Khadija Abid, Leila Hayet Mouss, Okba Kazar, Laïd Kahloul:
Formal approach based on petri nets using agent paradigm for m-maintenance. 91-117
Volume 7, Number 2, 2017
- Fateh Latreche, Faiza Belala:
A layered Petri net model to formally analyse time critical web service composition. 119-137 - Francesco Delli Priscoli, Alessandro Di Giorgio, Mariana Esposito, Andrea Fiaschetti, Francesco Flammini, Silvano Mignanti, Concetta Pragliola:
Ensuring cyber-security in smart railway surveillance with SHIELD. 138-170 - Pramod T. C, N. R. Sunitha:
Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures. 171-189 - Moustapha Bikienga, Annie Choquet-Geniet, Dominique Geniet:
Validation of the actual behaviour of a real-time application. 190-208
Volume 7, Number 3, 2017
- P. Sanjeevi, P. Viswanathan:
Smart homes IoT techniques for dynamic provision of cloud benefactors. 209-224 - Mohamad Chaitou:
Performance evaluation of a novel redundancy method for videoconferencing traffic in MPLS networks. 225-252 - Maya Souilah Benabdelhafid, Béatrice Bérard, Mahmoud Boufaïda:
Analysing timed compatibility of web service choreography. 253-278 - Bogdan Aman, Gabriel Ciobanu:
Verification of distributed systems involving bounded-time migration. 279-301
Volume 7, Number 4, 2017
- Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
A formal verification of dynamic updating in a Java-based embedded system. 303-340 - Luis Eduardo Mendoza, Manuel I. Capel:
A methodological approach for checking safety-critical systems software. 341-368 - Nadia Nahar, Kazi Sakib:
Software semantics and syntax as a tool for automated test generation. 369-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.