73,053 research outputs found
Recommended from our members
A Static Verification Framework for Secure Peer-to-Peer Applications
In this paper we present a static verification framework to support the design and verification of secure peer-to-peer applications. The framework supports the specification, modeling, and analysis of security aspects together with the general characteristics of the system, during early stages of the development life-cycle. The approach avoids security issues to be taken into consideration as a separate layer that is added to the system as an afterthought by the use of security protocols. The main functionality supported by the framework are concerned with the modeling of the system together with its security aspects by using an extension of UML, modeling of abuse cases to represent scenarios of attackers and assist with the identification of properties to be verified, specification of properties to be verified in a graphical template language, verification of the models against the properties, and visualization of the results of the verification process
Transverse Contraction Criteria for Existence, Stability, and Robustness of a Limit Cycle
This paper derives a differential contraction condition for the existence of
an orbitally-stable limit cycle in an autonomous system. This transverse
contraction condition can be represented as a pointwise linear matrix
inequality (LMI), thus allowing convex optimization tools such as
sum-of-squares programming to be used to search for certificates of the
existence of a stable limit cycle. Many desirable properties of contracting
dynamics are extended to this context, including preservation of contraction
under a broad class of interconnections. In addition, by introducing the
concepts of differential dissipativity and transverse differential
dissipativity, contraction and transverse contraction can be established for
large scale systems via LMI conditions on component subsystems.Comment: 6 pages, 1 figure. Conference submissio
Survey of Distributed Decision
We survey the recent distributed computing literature on checking whether a
given distributed system configuration satisfies a given boolean predicate,
i.e., whether the configuration is legal or illegal w.r.t. that predicate. We
consider classical distributed computing environments, including mostly
synchronous fault-free network computing (LOCAL and CONGEST models), but also
asynchronous crash-prone shared-memory computing (WAIT-FREE model), and mobile
computing (FSYNC model)
- …