


default search action
International Journal of Critical Computer-Based Systems, Volume 7
Volume 7, Number 1, 2017
- Mouloud Atmani, Djamil Aïssani

, Yassine Hadjadj-Aoul:
Modelling and analysis data fragmentation in IEEE 802.15.4 slotted CSMA/CA protocol without ACK mode. 4-21 - Alexander Gouberman, Martin Riedl, Markus Siegle

:
Analysing reward measures of LARES performability models by discontinuous Markov chains. 22-42 - Mohamed Escheikh, Kamel Barkaoui:

On the dependability evaluation of a virtual multiple input multiple output link. 43-58 - Mohand Yazid, Louiza Bouallouche-Medjkoune

, Djamil Aïssani
:
Modelling and performance analysis of video and voice streams in the IEEE 802.11e-EDCA WLANs with TXOP bursting under fading channel. 59-77 - Nadjette Rebouh, Ifeticene Ryma Asma, Aidoun Naoual, Louiza Bouallouche-Medjkoune

:
Failure detector-Ring Paxos-based atomic broadcast algorithm. 78-90 - Khadija Abid, Leila Hayet Mouss, Okba Kazar

, Laid Kahloul
:
Formal approach based on petri nets using agent paradigm for m-maintenance. 91-117
Volume 7, Number 2, 2017
- Fateh Latreche, Faiza Belala:

A layered Petri net model to formally analyse time critical web service composition. 119-137 - Francesco Delli Priscoli, Alessandro Di Giorgio, Mariana Esposito, Andrea Fiaschetti, Francesco Flammini

, Silvano Mignanti, Concetta Pragliola:
Ensuring cyber-security in smart railway surveillance with SHIELD. 138-170 - Pramod T. C, N. R. Sunitha:

Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures. 171-189 - Moustapha Bikienga, Annie Choquet-Geniet, Dominique Geniet:

Validation of the actual behaviour of a real-time application. 190-208
Volume 7, Number 3, 2017
- P. Sanjeevi, P. Viswanathan:

Smart homes IoT techniques for dynamic provision of cloud benefactors. 209-224 - Mohamad Chaitou:

Performance evaluation of a novel redundancy method for videoconferencing traffic in MPLS networks. 225-252 - Maya Souilah Benabdelhafid, Béatrice Bérard, Mahmoud Boufaïda:

Analysing timed compatibility of web service choreography. 253-278 - Bogdan Aman, Gabriel Ciobanu:

Verification of distributed systems involving bounded-time migration. 279-301
Volume 7, Number 4, 2017
- Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:

A formal verification of dynamic updating in a Java-based embedded system. 303-340 - Luis Eduardo Mendoza, Manuel I. Capel:

A methodological approach for checking safety-critical systems software. 341-368 - Nadia Nahar, Kazi Sakib:

Software semantics and syntax as a tool for automated test generation. 369-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














