Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

11 results
Image document

Passive Online RTT Estimation for Flow-Aware Routers Using One-Way Traffic

Damiano Carra , Konstantin Avrachenkov , Sara Alouf , Alberto Blanc , Philippe Nain , et al.
NETWORKING 2010, May 2010, Chennai, India. pp.109-121, ⟨10.1007/978-3-642-12963-6_9⟩
Conference papers inria-00496155v1
Image document

Ongoing Work on Automated Verification of Noisy Nonlinear Systems with Ariadne

Luca Geretti , Davide Bresolin , Pieter Collins , Sanja Zivanovic Gonzalez , Tiziano Villa
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.313-319, ⟨10.1007/978-3-319-67549-7_19⟩
Conference papers hal-01678971v1
Image document

A Semantic Theory of the Internet of Things

Ruggero Lanotte , Massimo Merro
18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.157-174, ⟨10.1007/978-3-319-39519-7_10⟩
Conference papers hal-01631725v1
Image document

Real vs Simulated Foveated Rendering to Reduce Visual Discomfort in Virtual Reality

Ariel Caputo , Andrea Giachetti , Salwa Abkal , Chiara Marchesini , Massimo Zancanaro
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.177-185, ⟨10.1007/978-3-030-85607-6_12⟩
Conference papers hal-04291223v1
Image document

Passive Online RTT Estimation for Flow-Aware Routers using One-Way Traffic

Damiano Carra , Konstantin Avrachenkov , Sara Alouf , Alberto Blanc , Philippe Nain , et al.
[Research Report] RR-7124, 2009
Reports inria-00436444v1
Image document

Verifiable Hierarchical Key Assignment Schemes

Anna Lisa Ferrara , Federica Paci , Chiara Ricciardi
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.357-376, ⟨10.1007/978-3-030-81242-3_21⟩
Conference papers hal-03677042v1
Image document

Modelling MAC-Layer Communications in Wireless Systems

Andrea Cerone , Matthew Hennessy , Massimo Merro
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.16-30, ⟨10.1007/978-3-642-38493-6_2⟩
Conference papers hal-01486032v1
Image document

A Modest Security Analysis of Cyber-Physical Systems: A Case Study

Ruggero Lanotte , Massimo Merro , Andrei Munteanu
38th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2018, Madrid, Spain. pp.58-78, ⟨10.1007/978-3-319-92612-4_4⟩
Conference papers hal-01824813v1
Image document

Towards a Logical Framework for Reasoning about Risk

Matteo Cristani , Erisa Karafili , Luca Viganò
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.609-623, ⟨10.1007/978-3-642-32498-7_46⟩
Conference papers hal-01542424v1
Image document

Statistical Model Checking of a Clock Synchronization Protocol for Sensor Networks

Luca Battisti , Damiano Macedonio , Massimo Merro
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.168-182, ⟨10.1007/978-3-642-40213-5_11⟩
Conference papers hal-01514659v1
Image document

Weak Simulation Quasimetric in a Gossip Scenario

Ruggero Lanotte , Massimo Merro , Simone Tini
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.139-155, ⟨10.1007/978-3-319-60225-7_10⟩
Conference papers hal-01658428v1